On the security of public key protocols
暂无分享,去创建一个
[1] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[2] Jeffrey D. Ullman,et al. Protection in operating systems , 1976, CACM.
[3] Roger M. Needham,et al. Using encryption for authentication in large networks of computers , 1978, CACM.
[4] Richard J. Lipton,et al. A Linear Time Algorithm for Deciding Subject Security , 1977, JACM.
[5] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[6] Danny Dolev,et al. The Byzantine Generals Strike Again , 1981, J. Algorithms.
[7] Whitfield Diffie,et al. Multiuser cryptographic techniques , 1976, AFIPS '76.
[8] Leslie Lamport,et al. Reaching Agreement in the Presence of Faults , 1980, JACM.