Documents Related by Co-Citation

862 Using encryption for authentication in large networks of computers – R Needham, M Schroeder - 1978
69 The Kerberos Network Authentication Service Version 5 – J Kohl, B Neuman - 1991
135 Three systems for cryptographic protocol analysis – R Kemmerer, C Meadows, J Millan - 1994
613 Breaking and Fixing the Needham-Schroeder Public-Key Protocol using FDR – Gavin Lowe - 1996
1132 A logic of authentication – Michael Burrows, Martín Abadi, Roger Needham - 1990
150 Proving Properties of Security Protocols by Induction – Lawrence C. Paulson - 1997
95 Modelling and verifying key-exchange protocols using CSP and FDR – A. W. Roscoe - 1995
263 Automated Analysis of Cryptographic Protocols Using Murphi – John C. Mitchell, Mark Mitchell, Ulrich Stern - 1997
1044 On the Security of Public Key Protocols – Danny Dolev, et al. - 1983
61 Analyzing the Needham-Schroeder Public Key Protocol: A Comparison of Two Approaches – Catherine A. Meadows - 1996
113 Security properties and CSP – Steve Schneider, Royal Holloway - 1995
783 A calculus for cryptographic protocols: The spi calculus – Martin Abadi, Andrew D. Gordon - 1999
121 The SSL Protocol - Version 3.0 – A Freier, P Karlton, P Kocher - 1996
123 Limitations of the Kerberos Authentication System – S. M. Bellovin, M. Merritt - 1991
623 Kerberos: An Authentication Service for Open Network Systems – Jennifer G. Steiner, Clifford Neuman, Jeffrey I. Schiller - 1988
463 Entity Authentication and Key Distribution – Mihir Bellare, Phillip Rogaway - 1993
207 Provably Secure Session Key Distribution -- The Three Party Case – Mihir Bellare, et al. - 1995
62 Mechanized Proofs for a Recursive Authentication Protocol – Lawrence C. Paulson - 1997
60 Breaking and the Needham-Schroeder public-key protocol using FDR – Gavin Lowe - 1996