Authentication protocols for computer networks: I
Computer Networks and ISDN Systems
The verifiability of two-party protocols
Proc. of a workshop on the theory and application of cryptographic techniques on Advances in cryptology---EUROCRYPT '85
The Interrogator: Protocol Secuity Analysis
IEEE Transactions on Software Engineering - Special issue on computer security and privacy
ACM SIGOPS Operating Systems Review
Efficient and timely mutual authentication
ACM SIGOPS Operating Systems Review
Experts systems applied to the analysis of key management schemes
Computers and Security
How to prove yourself: practical solutions to identification and signature problems
Proceedings on Advances in cryptology---CRYPTO '86
Zero-knowledge proofs of identity
Journal of Cryptology
Verification of network security protocols
Computers and Security
Using one-way functions for authentication
ACM SIGCOMM Computer Communication Review
SOSP '89 Proceedings of the twelfth ACM symposium on Operating systems principles
Reducing risks from poorly chosen keys
SOSP '89 Proceedings of the twelfth ACM symposium on Operating systems principles
ACM Transactions on Computer Systems (TOCS)
Network security via private-key certificates
ACM SIGOPS Operating Systems Review
High-level security architectures and the Kerberos system
Computer Networks and ISDN Systems - EARN/RARE Joint Networking Conference, Killarney, Ireland, 15–17, May 1990
A security risk of depending on synchronized clocks
ACM SIGOPS Operating Systems Review
Asymmetric user authentication
Computers and Security
An automatic search for security flaws in key management schemes
Computers and Security
A nonce-based protocol for multiple authentications
ACM SIGOPS Operating Systems Review
Authentication and authenticated key exchanges
Designs, Codes and Cryptography
A note on the use of timestamps as nonces
ACM SIGOPS Operating Systems Review
Secure communication using remote procedure calls
ACM Transactions on Computer Systems (TOCS)
Security Mechanisms in High-Level Network Protocols
ACM Computing Surveys (CSUR)
Timestamps in key distribution protocols
Communications of the ACM
Using encryption for authentication in large networks of computers
Communications of the ACM
Security defects in CCITT recommendation X.509: the directory authentication framework
ACM SIGCOMM Computer Communication Review
Limitations of the Kerberos authentication system
ACM SIGCOMM Computer Communication Review
A critique of the Burrows, Abadi and Needham logic
ACM SIGOPS Operating Systems Review
ACM SIGOPS Operating Systems Review
Verification and Modelling of Authentication Protocols
ESORICS '92 Proceedings of the Second European Symposium on Research in Computer Security
Special Uses and Sbuses of the Fiat-Shamir Passport Protocol
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
A Modification of the Fiat-Shamir Scheme
CRYPTO '88 Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology
An Improvement of the Fiat-Shamir Identification and Signature Scheme
CRYPTO '88 Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology
A Modular Approach to Key Distribution
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
Protokolle zum Austausch authenischer Schlüssel
VIS '91 Verläßliche Informationssysteme, GI-Fachtagung
Roles in Cryptographic Protocols
SP '92 Proceedings of the 1992 IEEE Symposium on Security and Privacy
A brief survey of current work on network attached peripherals (extended abstract)
ACM SIGOPS Operating Systems Review
Prudent Engineering Practice for Cryptographic Protocols
IEEE Transactions on Software Engineering
An approach to the formal verification of cryptographic protocols
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Security functions for a file repository
ACM SIGOPS Operating Systems Review
A calculus for cryptographic protocols: the spi calculus
Proceedings of the 4th ACM conference on Computer and communications security
On the properties of cryptographic protocols and the weaknesses of the BAN-like logics
ACM SIGOPS Operating Systems Review
A new logic for electronic commerce protocols
Theoretical Computer Science - Special issue: Algebraic methodology and software technology
Notes on Nominal Calculi for Security and Mobility
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
From Protocol Specifications to Flaws and Attack Scenarios: An Automatic and Formal Algorithm
WET-ICE '97 Proceedings of the 6th Workshop on Enabling Technologies on Infrastructure for Collaborative Enterprises
Formal Automatic Verification of Authentication Cryptographic Protocols
ICFEM '97 Proceedings of the 1st International Conference on Formal Engineering Methods
Secure transaction protocol analysis: models and applications
Secure transaction protocol analysis: models and applications
Cost and benefit analysis of authentication systems
Decision Support Systems
Hi-index | 0.01 |