A note on the use of timestamps as nonces (1993)

by B. Clifford Neuman , Stuart G. Stubblebine
Venue:OPERATING SYSTEMS REVIEW
Citations:56 - 0 self

Documents Related by Co-Citation

1213 A logic of authentication – Michael Burrows, Martín Abadi, Roger Needham - 1990
928 Using encryption for authentication in large networks of computers – R M NEEDHAM, SCHROEDER - 1978
1132 On the Security of Public Key Protocols – Danny Dolev, et al. - 1983
266 Time- stamps in Key Distribution Protocols – D E Denning, G M Sacco - 1981
251 A survey of authentication protocol literature – John Clark, Jeremy Jacob - 1997
377 Prudent Engineering Practice for Cryptographic Protocols – Martin Abadi, Roger Needhamt - 1994
642 Breaking and Fixing the Needham-Schroeder Public-Key Protocol using FDR – Gavin Lowe - 1996
152 Proving Properties of Security Protocols by Induction – Lawrence C. Paulson - 1997
136 Efficient and Timely Mutual Authentication – D Otway, O Rees - 1987