A logic of authentication
- 1 November 1989
- proceedings article
- Published by Association for Computing Machinery (ACM)
- Vol. 23 (5), 1-13
- https://doi.org/10.1145/74850.74852
Abstract
No abstract availableThis publication has 12 references indexed in Scilit:
- Integrating security in a large distributed systemACM Transactions on Computer Systems, 1989
- A knowledge-based analysis of zero knowledgePublished by Association for Computing Machinery (ACM) ,1988
- Efficient and timely mutual authenticationACM SIGOPS Operating Systems Review, 1987
- A key distribution protocol using event markersACM Transactions on Computer Systems, 1983
- Security Mechanisms in High-Level Network ProtocolsACM Computing Surveys, 1983
- Cryptographic protocolsPublished by Association for Computing Machinery (ACM) ,1982
- Timestamps in key distribution protocolsCommunications of the ACM, 1981
- Using encryption for authentication in large networks of computersCommunications of the ACM, 1978
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978
- An axiomatic basis for computer programmingCommunications of the ACM, 1969