Systematic Design of Two-Party Authentication Protocols
- 18 May 2001
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 19 references indexed in Scilit:
- How To Prove Yourself: Practical Solutions to Identification and Signature ProblemsPublished by Springer Nature ,2000
- Limitations of the Kerberos authentication systemACM SIGCOMM Computer Communication Review, 1990
- Reasoning about belief in cryptographic protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1990
- On the formal specification and verification of a multiparty session protocolPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1990
- A logic of authenticationPublished by Association for Computing Machinery (ACM) ,1989
- Source to destination communication in the presence of faultsPublished by Association for Computing Machinery (ACM) ,1989
- Universal one-way hash functions and their cryptographic applicationsPublished by Association for Computing Machinery (ACM) ,1989
- Message authenticationIEEE Communications Magazine, 1985
- Probabilistic encryptionJournal of Computer and System Sciences, 1984
- A key distribution protocol using event markersACM Transactions on Computer Systems, 1983