Some new attacks upon security protocols
- 23 December 2002
- proceedings article
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- p. 162-169
- https://doi.org/10.1109/csfw.1996.503701
Abstract
No abstract availableKeywords
This publication has 24 references indexed in Scilit:
- Intensional specifications of security protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- A taxonomy of replay attacks [cryptographic protocols]Published by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Modelling and verifying key-exchange protocols using CSP and FDRPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- On the security of recent protocolsInformation Processing Letters, 1995
- An attack on the Needham-Schroeder public-key authentication protocolInformation Processing Letters, 1995
- On the security of SPLICE/AS — The authentication system in WIDE InternetInformation Processing Letters, 1995
- Two attacks on Neuman—Stubblebine authentication protocolsInformation Processing Letters, 1995
- Three systems for cryptographic protocol analysisJournal of Cryptology, 1994
- Systematic design of a family of attack-resistant authentication protocolsIEEE Journal on Selected Areas in Communications, 1993
- Authentication and authenticated key exchangesDesigns, Codes and Cryptography, 1992