A taxonomy of replay attacks [cryptographic protocols]
Top Cited Papers
- 17 December 2002
- proceedings article
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
No abstract availableThis publication has 16 references indexed in Scilit:
- Using logics to detect implementation-dependent flaws [cryptographic protocol design]Published by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- A system for the specification and analysis of key management protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- A logic of communication in hostile environmentPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- On key distribution protocols for repeated authenticationACM SIGOPS Operating Systems Review, 1993
- Systematic design of a family of attack-resistant authentication protocolsIEEE Journal on Selected Areas in Communications, 1993
- Adding time to a logic of authenticationPublished by Association for Computing Machinery (ACM) ,1993
- Applying Formal Methods to the Analysis of a Key Management ProtocolJournal of Computer Security, 1992
- Limitations of challenge-response entity authenticationElectronics Letters, 1989
- Timestamps in key distribution protocolsCommunications of the ACM, 1981
- Using encryption for authentication in large networks of computersCommunications of the ACM, 1978