An authentication logic supporting synchronization, revocation, and recency
暂无分享,去创建一个
[1] Theodore Y. Ts'o,et al. Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.
[2] Li Gong,et al. Reasoning about belief in cryptographic protocols , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[3] Mark R. Tuttle,et al. A Semantics for a Logic of Authentication , 1991, PODC 1991.
[4] Yoram Moses,et al. Knowledge, Timed Precedence and Clocks , 1995, PODC 1995.
[5] Paul F. Syverson,et al. On unifying some cryptographic protocol logics , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[6] Stuart G. Stubblebine,et al. Recent-secure authentication: enforcing revocation in distributed systems , 1995, Proceedings 1995 IEEE Symposium on Security and Privacy.
[7] Ronald Fagin,et al. Reasoning about knowledge , 1995 .
[8] B. Lampson,et al. Authentication in distributed systems: theory and practice , 1991, TOCS.
[9] Butler W. Lampson,et al. Authentication in distributed systems , 1993 .
[10] Martín Abadi,et al. A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.
[11] Martín Abadi,et al. A Calculus for Access Control in Distributed Systems , 1991, CRYPTO.
[12] Paul F. Syverson. Adding time to a logic of authentication , 1993, CCS '93.
[13] Martín Abadi,et al. A semantics for a logic of authentication (extended abstract) , 1991, PODC '91.