Design Principles and Security of Authentication Protocols with Trusted Third Party
暂无分享,去创建一个
Jun Han | Zhaohao Sun | Zhaohao Sun | Xianxian Li | Jun Han | Xianxian Li
[1] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[2] Roger M. Needham,et al. Using encryption for authentication in large networks of computers , 1978, CACM.
[3] Dan Harkins,et al. The Internet Key Exchange (IKE) , 1998, RFC.
[4] Martín Abadi,et al. Prudent Engineering Practice for Cryptographic Protocols , 1994, IEEE Trans. Software Eng..
[5] Owen Rees,et al. Efficient and timely mutual authentication , 1987, OPSR.
[6] John C. Mitchell,et al. Undecidability of bounded security protocols , 1999 .
[7] Bruce Schneier,et al. Applied cryptography : protocols, algorithms, and source codein C , 1996 .
[8] John A. Clark,et al. A survey of authentication protocol literature: Version 1.0 , 1997 .
[9] Paul Syverson,et al. A Taxonomy of Replay Attacks , 1994 .
[10] John T. Kohl,et al. The Kerberos Network Authentication Service (V5 , 2004 .
[11] Gavin Lowe. Analyzing a Library of Security Protocols using Casper and FDR , 1999 .
[12] Peter Jorgensen,et al. Applied cryptography: Protocols, algorithm, and source code in C: By Bruce Schneier. New York: John Wiley, 1993. 618 p. $44.95 (paper). ISBN 0-471-59756-2 , 1996 .
[13] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .
[14] Ulf Carlsen. Optimal privacy and authentication on a portable communications system , 1994, OPSR.
[15] Giovanni Maria Sacco,et al. Timestamps in key distribution protocols , 1981, CACM.
[16] Li Gong,et al. Variations on the themes of message freshness and replay-or the difficulty in devising formal methods to analyze cryptographic protocols , 1993, [1993] Proceedings Computer Security Foundations Workshop VI.