Towards Extensional Goals in Authentication Protocols (1997)

Cached

Download Links

by Colin Boyd
Venue:In Proceedings of the 1997 DIMACS Workshop on Design and Formal Verification of Security Protocols
Citations:11 - 0 self

Documents Related by Co-Citation

864 Using encryption for authentication in large networks of computers – R M Needham, M D Schroeder
613 Breaking and Fixing the Needham-Schroeder Public-Key Protocol using FDR – Gavin Lowe - 1996
1138 A logic of authentication – Michael Burrows, Martín Abadi, Roger Needham - 1990
55 What do we mean by entity authentication – D Gollmann - 1996
92 Some New Attacks upon Security Protocols – Gavin Lowe - 1996
188 A Hierarchy of Authentication Specifications – Gavin Lowe - 1997
44 Intensional Specifications of Security Protocols – A. W. Roscoe - 1998
32 On the risk of opening distributed keys – M Burmester - 1994
1123 Identity-Based Encryption from the Weil Pairing – Dan Boneh, Matthew Franklin - 2001
464 Entity Authentication and Key Distribution – Mihir Bellare, Phillip Rogaway - 1993
2714 New Directions in Cryptography – Whitfield Diffie, Martin E. Hellman - 1976
17 H.: On Seeking Smart Public-Key-Distribution Systems – T Matsumoto, Y Takashima, Imai - 1986
2468 Handbook of Applied Cryptography – Alfred J. Menezes, Paul C. Van Oorschot, Scott A. Vanstone, R. L. Rivest - 1997
33 Using Non Interference for the Analysis of Security Protocols – Riccardo Focardi, Anna Ghelli, Roberto Gorrieri, Mura Anteo Zamboni, I Bologna (italy - 1997
212 An Attack on the Needham-Schroeder Public-Key Authentication Protocol – Gavin Lowe - 1995
73 Verifying authentication protocols with CSP – Steve Schneider
1047 On the Security of Public Key Protocols – Danny Dolev, et al. - 1983
188 Reasoning about Belief in Cryptographic Protocols – Li Gong, Roger Needham, Raphael Yahalom - 1990
3 Intensional speci of security protocols – A W Roscoe - 1996