Reasoning about Message Integrity
- 1 January 1995
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 12 references indexed in Scilit:
- Limitations of the Kerberos authentication systemACM SIGCOMM Computer Communication Review, 1990
- A logic of authenticationACM Transactions on Computer Systems, 1990
- Reasoning about belief in cryptographic protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1990
- Privacy enhancement for Internet electronic mail: Part I - message encipherment and authentication proceduresPublished by RFC Editor ,1989
- Privacy enhancement for Internet electronic mail: Part III - algorithms, modes, and identifiersPublished by RFC Editor ,1989
- Solutions to the multidestination secure electronic mail problemComputers & Security, 1988
- Protocol failures in cryptosystemsProceedings of the IEEE, 1988
- Privacy enhancement for Internet electronic mail: Part I: Message encipherment and authentication proceduresPublished by RFC Editor ,1987
- Digital signatures with RSA and other public-key cryptosystemsCommunications of the ACM, 1984
- On the security of public key protocolsIEEE Transactions on Information Theory, 1983