A note on the use of timestamps as nonces (1993)

by B. Clifford Neuman , Stuart G. Stubblebine
Venue:OPERATING SYSTEMS REVIEW
Citations:53 - 0 self

Documents Related by Co-Citation

1132 A logic of authentication – Michael Burrows, Martín Abadi, Roger Needham - 1990
862 Using encryption for authentication in large networks of computers – R Needham, M Schroeder - 1978
1044 On the Security of Public Key Protocols – Danny Dolev, et al. - 1983
249 Timestamps in key distribution protocols – D Denning, G Sacco - 1981
226 A survey of authentication protocol literature – John Clark, Jeremy Jacob - 1997
150 Proving Properties of Security Protocols by Induction – Lawrence C. Paulson - 1997
122 Efficient and Timely Mutual Authentication – D Otway - 1987
354 Prudent Engineering Practice for Cryptographic Protocols – Martin Abadi, Roger Needhamt - 1994
24 A Nonce-Based Protocol For Multiple Authentications – Kehne Schonwalder, A. Kehne, J. Schonwalder, H. Langendorfer, Tu Braunschweig - 1992
30 Roles in cryptographic protocols – E Snekkenes - 1992
613 Breaking and Fixing the Needham-Schroeder Public-Key Protocol using FDR – Gavin Lowe - 1996
198 A compiler for the analysis of security protocols – Casper - 1998
135 Three systems for cryptographic protocol analysis – R Kemmerer, C Meadows, J Millan - 1994
264 Authentication and Authenticated Key Exchanges – Whitfield Diffie, Paul C. Van Oorschot, Michael J. Wiener - 1992
210 An Attack on the Needham-Schroeder Public-Key Authentication Protocol – Gavin Lowe - 1995
46 A Logical Language for Specifying Cryptographic Protocol Requirements – Paul Syverson, Catherine Meadows - 1993
115 spaces: Proving security protocols correct – Strand - 1999
44 Adding Time to a Logic of Authentication – Paul F. Syverson - 1993
45 Systematic Design of a Family of Attack-Resistant Authentication Protocols – R. Bird, R. Bird, I. Gopal, I. Gopal, A. Herzberg, A. Herzberg, P. Janson, P. Janson, S. Kutten, S. Kutten, R. Molva, R. Molva, M. Yung, M. Yung - 1992