A lesson on authentication protocol design
- 1 July 1994
- journal article
- Published by Association for Computing Machinery (ACM) in ACM SIGOPS Operating Systems Review
- Vol. 28 (3), 24-37
- https://doi.org/10.1145/182110.182113
Abstract
No abstract availableKeywords
This publication has 6 references indexed in Scilit:
- Verifying authentication protocols: methodology and examplePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- On key distribution protocols for repeated authenticationACM SIGOPS Operating Systems Review, 1993
- Systematic design of a family of attack-resistant authentication protocolsIEEE Journal on Selected Areas in Communications, 1993
- 'Authentication' revisited (correction and addendum to 'Authentication' for distributed systems, Jan. 92, 39-52)Computer, 1992
- A logic of authenticationACM Transactions on Computer Systems, 1990
- Reaching Agreement in the Presence of FaultsJournal of the ACM, 1980