Encryption and Secure Computer Networks
ACM Computing Surveys (CSUR)
Timestamps in key distribution protocols
Communications of the ACM
Using encryption for authentication in large networks of computers
Communications of the ACM
On the efficient implementation of fair non-repudiation
ACM SIGCOMM Computer Communication Review
On the validity of digital signatures
ACM SIGCOMM Computer Communication Review
A Secure Pay-per View Scheme for Web-Based Video Service
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
ACM SIGOPS Operating Systems Review
An intensive survey of fair non-repudiation protocols
Computer Communications
Securing digital signatures for non-repudiation
Computer Communications
Hi-index | 48.22 |
One of Needham and Schroeder's proposed signature authentication protocols is shown to fail when there is a possibility of compromised keys: this invalidates one of the applications of their technique. A more elaborate mechanism is proposed which does not require a network clock, but does require a third party to the transaction. The latter approach is shown to be reliable in a fairly strong sense.