Documents Related by Co-Citation

866 Using encryption for authentication in large networks of computers – R Needham, M Schroeder - 1978
136 Three systems for cryptographic protocol analysis – R Kemmerer, C Meadows, J Millen - 1994
70 The Kerberos Network Authentication Service (Version 5 – J T Kohl, B C Neuman - 1993
615 Breaking and Fixing the Needham-Schroeder Public-Key Protocol using FDR – Gavin Lowe - 1996
1143 A logic of authentication – Michael Burrows, Martín Abadi, Roger Needham - 1990
150 Proving Properties of Security Protocols by Induction – Lawrence C. Paulson - 1997
96 Modelling and verifying key-exchange protocols using CSP and FDR – A. W. Roscoe - 1995
263 Automated Analysis of Cryptographic Protocols Using Murphi – John C. Mitchell, Mark Mitchell, Ulrich Stern - 1997
1053 On the Security of Public Key Protocols – Danny Dolev, et al. - 1983
123 Limitations of the Kerberos Authentication System – S. M. Bellovin, M. Merritt - 1991
626 Kerberos: An Authentication Service for Open Network Systems – Jennifer G. Steiner, Clifford Neuman, Jeffrey I. Schiller - 1988
61 Analyzing the Needham-Schroeder Public Key Protocol: A Comparison of Two Approaches – Catherine A. Meadows - 1996
115 Security properties and CSP – Steve Schneider, Royal Holloway - 1995
120 The SSL protocol (version 3.0 – A O FREIER, P KARLTON, P C KOCHER - 1996
786 A calculus for cryptographic protocols: The spi calculus – Martin Abadi, Andrew D. Gordon - 1999
209 Provably Secure Session Key Distribution -- The Three Party Case – Mihir Bellare, et al. - 1995
469 Entity Authentication and Key Distribution – Mihir Bellare, Phillip Rogaway - 1993
62 Mechanized Proofs for a Recursive Authentication Protocol – Lawrence C. Paulson - 1997
84 Authentication for Distributed Systems – Thomas Y. C. Woo, Simon S. Lam - 1992