ACM Transactions on Computer Systems (TOCS)
A note on the use of timestamps as nonces
ACM SIGOPS Operating Systems Review
Mechanized proofs for a recursive authentication protocol
CSFW '97 Proceedings of the 10th IEEE workshop on Computer Security Foundations
Proceedings of the 2003 workshop on New security paradigms
Computational soundness for standard assumptions of formal cryptography
Computational soundness for standard assumptions of formal cryptography
Hi-index | 0.00 |
Authentication is a process by which communicating entities prove their identity. As per BAN logic [1], an important but not the only goal of authentication between two entities A and B is to establish First Level Belief and Second Level Belief.