A logic of authentication
暂无分享,去创建一个
[1] Jonathan K. Millen,et al. The Interrogator: Protocol Secuity Analysis , 1987, IEEE Transactions on Software Engineering.
[2] Mahadev Satyanarayanan,et al. Integrating security in a large distributed system , 1989, TOCS.
[3] Roger M. Needham,et al. Using encryption for authentication in large networks of computers , 1978, CACM.
[4] Nancy A. Lynch,et al. Cryptographic protocols , 1982, STOC '82.
[5] Stephen T. Kent,et al. Security Mechanisms in High-Level Network Protocols , 1983, CSUR.
[6] Owen Rees,et al. Efficient and timely mutual authentication , 1987, OPSR.
[7] Giovanni Maria Sacco,et al. Timestamps in key distribution protocols , 1981, CACM.
[8] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[9] Joseph Y. Halpern,et al. A knowledge-based analysis of zero knowledge , 1988, STOC '88.
[10] C. A. R. Hoare,et al. An axiomatic basis for computer programming , 1969, CACM.
[11] Mark R. Tuttle,et al. A Knowledge-Based Analysis of Zero Knowledge (Preliminary Report) , 1988, STOC 1988.
[12] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[13] Martín Abadi,et al. Authentication: A Practical Study in Belief and Action , 1988, TARK.
[14] Thomas A. Berson,et al. A key distribution protocol using event markers , 1983, TOCS.