Authentication primitives and their compilation
- 5 January 2000
- proceedings article
- Published by Association for Computing Machinery (ACM)
- p. 302-315
- https://doi.org/10.1145/325694.325734
Abstract
No abstract availableThis publication has 18 references indexed in Scilit:
- On modelling mobilityTheoretical Computer Science, 2000
- Verifying authentication protocols in CSPIEEE Transactions on Software Engineering, 1998
- Prudent engineering practice for cryptographic protocolsIEEE Transactions on Software Engineering, 1996
- A theory of processes with localitiesFormal Aspects of Computing, 1994
- Authentication in distributed systemsACM Transactions on Computer Systems, 1992
- A logic of authenticationACM SIGOPS Operating Systems Review, 1989
- Analyzing encryption protocols using formal verification techniquesIEEE Journal on Selected Areas in Communications, 1989
- Secure communication using remote procedure callsACM Transactions on Computer Systems, 1985
- Using encryption for authentication in large networks of computersCommunications of the ACM, 1978
- Protection in programming languagesCommunications of the ACM, 1973