Authentication tests and the structure of bundles
- 14 June 2002
- journal article
- Published by Elsevier in Theoretical Computer Science
- Vol. 283 (2) , 333-380
- https://doi.org/10.1016/s0304-3975(01)00139-6
Abstract
No abstract availableKeywords
This publication has 27 references indexed in Scilit:
- Using State Space Exploration and a Natural Deduction Style Message Derivation Engine to Verify Security ProtocolsPublished by Springer Nature ,1998
- An attack on the Needham-Schroeder public-key authentication protocolInformation Processing Letters, 1995
- Two attacks on Neuman—Stubblebine authentication protocolsInformation Processing Letters, 1995
- Optimal privacy and authentication on a portable communications systemACM SIGOPS Operating Systems Review, 1994
- A lesson on authentication protocol designACM SIGOPS Operating Systems Review, 1994
- A note on the use of timestamps as noncesACM SIGOPS Operating Systems Review, 1993
- A logic of authenticationACM Transactions on Computer Systems, 1990
- Efficient and timely mutual authenticationACM SIGOPS Operating Systems Review, 1987
- On the security of public key protocolsIEEE Transactions on Information Theory, 1983
- Using encryption for authentication in large networks of computersCommunications of the ACM, 1978