Byzantine clock synchronization
ACM SIGOPS Operating Systems Review
Timestamps in key distribution protocols
Communications of the ACM
Using encryption for authentication in large networks of computers
Communications of the ACM
Authentication in distributed systems: a bibliography
ACM SIGOPS Operating Systems Review
Lower bounds on messages and rounds for network authentication protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Optimality of multi-domain protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
On simple and secure key distribution
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
An efficient and secure authentication protocol using uncertified keys
ACM SIGOPS Operating Systems Review
Refinement and extension of encrypted key exchange
ACM SIGOPS Operating Systems Review
The KryptoKnight family of light-weight protocols for authentication and key distribution
IEEE/ACM Transactions on Networking (TON)
Provably secure session key distribution: the three party case
STOC '95 Proceedings of the twenty-seventh annual ACM symposium on Theory of computing
Prudent Engineering Practice for Cryptographic Protocols
IEEE Transactions on Software Engineering
An approach to the formal verification of cryptographic protocols
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Anonymous credit cards and their collusion analysis
IEEE/ACM Transactions on Networking (TON)
A HOL extension of GNY for automatically analyzing cryptographic protocols
CSFW '96 Proceedings of the 9th IEEE workshop on Computer Security Foundations
Scalability and Flexibility in Authentication Services: The KryptoKnight Approach
INFOCOM '97 Proceedings of the INFOCOM '97. Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Driving the Information Revolution
An Efficient Cryptographic Protocol Verifier Based on Prolog Rules
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
Authentication: a practical study in belief and action
TARK '88 Proceedings of the 2nd conference on Theoretical aspects of reasoning about knowledge
WITS '05 Proceedings of the 2005 workshop on Issues in the theory of security
Efficient network authentication protocols: lower bounds and optimal implementations
Distributed Computing
ACM Transactions on Information and System Security (TISSEC)
Static validation of security protocols
Journal of Computer Security
A Quantifier-free First-order Knowledge Logic of Authentication
Fundamenta Informaticae - SPECIAL ISSUE ON CONCURRENCY SPECIFICATION AND PROGRAMMING (CS&P 2005) Ruciane-Nide, Poland, 28-30 September 2005
Design and implementation of a secure wide-area object middleware
Computer Networks: The International Journal of Computer and Telecommunications Networking
A set of protocols for micropayments in distributed systems
WOEC'95 Proceedings of the 1st conference on USENIX Workshop on Electronic Commerce - Volume 1
A formalism for visual security protocol modeling
Journal of Visual Languages and Computing
Automatic verification of correspondences for security protocols
Journal of Computer Security
Formalizing and Analyzing the Needham-Schroeder Symmetric-Key Protocol by Rewriting
Electronic Notes in Theoretical Computer Science (ENTCS)
Tags for Multi-Protocol Authentication
Electronic Notes in Theoretical Computer Science (ENTCS)
The ρ-spi Calculus at Work: Authentication Case Studies
Electronic Notes in Theoretical Computer Science (ENTCS)
Security protocols: principles and calculi tutorial notes
Foundations of security analysis and design IV
Finite models for formal security proofs
Journal of Computer Security - 7th International Workshop on Issues in the Theory of Security (WITS'07)
Harmful adult multimedia contents filtering method in mobile RFID service environment
ICCCI'10 Proceedings of the Second international conference on Computational collective intelligence: technologies and applications - Volume Part II
SP'88 Proceedings of the 1988 IEEE conference on Security and privacy
A smart card-based mental poker system
CARDIS'06 Proceedings of the 7th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
Static analysis of authentication
Foundations of Security Analysis and Design III
Formal verification of a type flaw attack on a security protocol using object-z
ZB'05 Proceedings of the 4th international conference on Formal Specification and Development in Z and B
BGN authentication and its extension to convey message commitments
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III
Research note: Group-oriented authentication mechanism with key exchange
Computer Communications
A Quantifier-free First-order Knowledge Logic of Authentication
Fundamenta Informaticae - SPECIAL ISSUE ON CONCURRENCY SPECIFICATION AND PROGRAMMING (CS&P 2005) Ruciane-Nide, Poland, 28-30 September 2005
A review of GENI authentication and access control mechanisms
International Journal of Security and Networks
Lightweight security scheme for vehicle tracking system using CoAP
Proceedings of the International Workshop on Adaptive Security
Hi-index | 0.00 |