A Real-World Analysis of Kerberos Password Security (1999)

Cached

Download Links

by Thomas Wu
Citations:65 - 0 self

Active Bibliography

554 Pervasive Computing: Vision and Challenges – M. Satyanarayanan - 2001
642 Breaking and Fixing the Needham-Schroeder Public-Key Protocol using FDR – Gavin Lowe - 1996
861 Applied Cryptography -- Protocols, Algorithms, and . . . – Bruce Schneier
828 A calculus for cryptographic protocols: The spi calculus – Martin Abadi, Andrew D. Gordon - 1999
1132 On the Security of Public Key Protocols – Danny Dolev, et al. - 1983
1535 Security Architecture for the Internet Protocol – Randall Atkinson - 1995
1213 A logic of authentication – Michael Burrows, Martín Abadi, Roger Needham - 1990
579 DART: Directed automated random testing – Patrice Godefroid, Nils Klarlund, Koushik Sen - 2005
544 Data Security – Dorothy E. Denning, Peter J. Denning - 1979