KryptoKnight Authentication and Key Distribution System (1993)

Cached

Download Links

by Refik Molva , Gene Tsudik , Els van Herreweghen , Stefano Zatti
Venue:In ESORICS '92, LNCS 648
Citations:39 - 3 self

Documents Related by Co-Citation

1138 A logic of authentication – Michael Burrows, Martín Abadi, Roger Needham - 1990
624 Kerberos: An Authentication Service for Open Network Systems – Jennifer G. Steiner, Clifford Neuman, Jeffrey I. Schiller - 1988
864 Using encryption for authentication in large networks of computers – R M Needham, M D Schroeder
445 Authentication in distributed systems: Theory and practice – Butler Lampson, Martín Abadi, Michael Burrows, Edward Wobber - 1992
2913 A Method for Obtaining Digital Signatures and Public-Key Cryptosystems – R.L. Rivest, A. Shamir, L. Adleman - 1978
2714 New Directions in Cryptography – Whitfield Diffie, Martin E. Hellman - 1976
61 SPX: Global authentication using public key certificates – J J Tardo, K Alagappan - 1991
249 G.M.: Timestamps in key distribution protocols – D E Denning, Sacco - 1981
84 Authentication for Distributed Systems – Thomas Y. C. Woo, Simon S. Lam - 1992
90 The Digital Distributed System Security Architecture – Morrie Gasser - 1989
123 Limitations of the Kerberos Authentication System – S. M. Bellovin, M. Merritt - 1991
32 Using One-Way Functions for Authentication – Li Gong - 1989
122 Efficient and Timely Mutual Authentication – D Otway - 1987
55 A Security Risk of Depending on Synchronized Clocks – Li Gong - 1991
47 On Message Integrity in Cryptographic Protocols – S Stubblebine, V Gligor - 1992
60 Trust Relationships in Secure Systems - A Distributed Authentication Perspective – R. Yahalom, B. Klein, T. Beth, Delta Th. Beth - 1993
46 A Logical Language for Specifying Cryptographic Protocol Requirements – Paul Syverson, Catherine Meadows - 1993
7 11770-2: Key management, part 2: Key management mechanisms using symmetric techniques – CD
72 The Kerberos Network Authentication Service – C Neuman, T Yu, S Hartman, K Raeburn - 2005