Reasoning about Belief in Cryptographic Protocols (1990)

Cached

Download Links

by Li Gong , Roger Needham , Raphael Yahalom
Venue:Proceedings 1990 IEEE Symposium on Research in Security and Privacy
Citations:207 - 6 self

Documents Related by Co-Citation

11073 Computers and Intractability: A Guide to the Theory of NP-Completeness – M R Garey, D S Johnson - 1979
1156 A logic of authentication – Michael Burrows, Martín Abadi, Roger Needham - 1990
882 Using encryption for authentication in large networks of computers – R M Needham, M D Schroeder - 1978
1066 On the Security of Public Key Protocols – Danny Dolev, et al. - 1983
252 Timestamps in key distribution protocols – D E Denning, G M Sacco - 1981
792 A calculus for cryptographic protocols: The spi calculus – Martin Abadi, Andrew D. Gordon - 1999
616 Breaking and Fixing the Needham-Schroeder Public-Key Protocol using FDR – Gavin Lowe - 1996
2765 New Directions in Cryptography – Whitfield Diffie, Martin E. Hellman - 1976
2980 A Method for Obtaining Digital Signatures and Public-Key Cryptosystems – R.L. Rivest, A. Shamir, L. Adleman - 1978