A lesson on authentication protocol design
ACM SIGOPS Operating Systems Review
Non Interference for the Analysis of Cryptographic Protocols
ICALP '00 Proceedings of the 27th International Colloquium on Automata, Languages and Programming
SNP: an interface for secure network programming
USTC'94 Proceedings of the USENIX Summer 1994 Technical Conference on USENIX Summer 1994 Technical Conference - Volume 1
Hi-index | 4.10 |
In the article by T.Y.C. Woo and S.S. Lam (see ibid., vol.25, no.1, p.39-52, 1992), the peer-peer authentication protocol needs augmentation, this augmentation is presented and discussed briefly.