Authentication tests
- 7 November 2002
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
No abstract availableKeywords
This publication has 20 references indexed in Scilit:
- Athena: a new efficient automatic checker for security protocol analysisPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Proving properties of security protocols by inductionPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Casper: a compiler for the analysis of security protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- An attack on the Needham-Schroeder public-key authentication protocolInformation Processing Letters, 1995
- A note on the use of timestamps as noncesACM SIGOPS Operating Systems Review, 1993
- A logic of authenticationACM Transactions on Computer Systems, 1990
- Key Distribution Protocol for Digital Mobile Communication SystemsPublished by Springer Nature ,1990
- A logic of authenticationPublished by Association for Computing Machinery (ACM) ,1989
- Efficient and timely mutual authenticationACM SIGOPS Operating Systems Review, 1987
- Using encryption for authentication in large networks of computersCommunications of the ACM, 1978