Security Protocols
暂无分享,去创建一个
J. van Leeuwen | Bruce Christianson | Jan van Leeuwen | Michael Roe | Bruno Crispo | James A. Malcolm
[1] Mihir Bellare,et al. Provably secure session key distribution: the three party case , 1995, STOC '95.
[2] Lawrence C. Paulson,et al. The Inductive Approach to Verifying Cryptographic Protocols , 2021, J. Comput. Secur..
[3] Geraint Price,et al. The interaction between fault tolerance and security , 1999 .
[4] Michael K. Reiter,et al. Distributing trust with the Rampart toolkit , 1996, CACM.
[5] M. Kuhn,et al. The Advanced Computing Systems Association Design Principles for Tamper-resistant Smartcard Processors Design Principles for Tamper-resistant Smartcard Processors , 2022 .
[6] Giampaolo Bella. Inductive Verification of Smart Card Protocols , 2003, J. Comput. Secur..
[7] Giampaolo Bella. Modelling Agents' Knowledge Inductively , 1999, Security Protocols Workshop.
[8] Gavin Lowe,et al. An Attack on the Needham-Schroeder Public-Key Authentication Protocol , 1995, Inf. Process. Lett..
[9] Michael K. Reiter,et al. Secure agreement protocols: reliable and atomic group multicast in rampart , 1994, CCS '94.
[10] Michael K. Reiter,et al. The Rampart Toolkit for Building High-Integrity Services , 1994, Dagstuhl Seminar on Distributed Systems.
[11] Silvio Micali,et al. Secret-key agreement without public-key , 1994, CRYPTO 1994.
[12] Peter Honeyman,et al. Implementation of a Provably Secure, Smartcard-Based Key Distribution Protocol , 1998, CARDIS.
[13] Roger M. Needham,et al. Using encryption for authentication in large networks of computers , 1978, CACM.
[14] Fred B. Schneider,et al. Implementing fault-tolerant services using the state machine approach: a tutorial , 1990, CSUR.
[15] Martín Abadi,et al. Prudent Engineering Practice for Cryptographic Protocols , 1994, IEEE Trans. Software Eng..