Hiding Names: Private Authentication in the Applied Pi Calculus
暂无分享,去创建一个
[1] G. Tsudik,et al. Authentication of mobile users , 1994, IEEE Network.
[2] Roger M. Needham,et al. Using encryption for authentication in large networks of computers , 1978, CACM.
[3] Martín Abadi,et al. Mobile values, new names, and secure communication , 2001, POPL '01.
[4] Hugo Krawczyk,et al. SKEME: a versatile secure key exchange mechanism for Internet , 1996, Proceedings of Internet Society Symposium on Network and Distributed Systems Security.
[5] Hugo Krawczyk,et al. Untraceable mobility or how to travel incognito , 1999, Comput. Networks.
[6] Martín Abadi,et al. Secure implementation of channel abstractions , 1998, Proceedings. Thirteenth Annual IEEE Symposium on Logic in Computer Science (Cat. No.98CB36226).
[7] Martín Abadi,et al. Authentication primitives and their compilation , 2000, POPL '00.
[8] Angelos D. Keromytis,et al. Efficient, DoS-resistant, secure key exchange for internet protocols , 2001, CCS '02.
[9] Angelos D. Keromytis,et al. Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols , 2001, Security Protocols Workshop.
[10] Paul F. Syverson,et al. Protocols Using Anonymous Connections: Mobile Applications , 1997, Security Protocols Workshop.
[11] Markus Jakobsson,et al. Security Weaknesses in Bluetooth , 2001, CT-RSA.
[12] G. Tsudik,et al. Traveling Incognito , 1998 .
[13] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[14] B. Lampson,et al. Authentication in distributed systems: theory and practice , 1991, TOCS.
[15] Gene Tsudik,et al. Authentication of Mobile Users A new set of inter-domain security mechanisms is needed for users to venture into remote domains while inheriting privileges from their home domains. , 1994 .
[16] Hannes Federrath,et al. MIXes in Mobile Communication Systems: Location Management with Privacy , 1996, Information Hiding.
[17] N. Asokan,et al. Untraceability in mobile networks , 1995, MobiCom '95.