A logic of authentication
Tóm tắt
Từ khóa
Tài liệu tham khảo
BURROWS , M. , ABADI , M. , AND NEEDHAM , R.M. Authentication : A practical study in belief and action . In Proceedings of the 2nd Conference on Theoretical Aspects of Reasoning about Knowledge (Asilomar, Ca. , Feb. 1988 ) M. Vardi, Ed. Morgan Kaufmann, Los Altos, Calif. , 1988, pp. 325 - 342 . BURROWS, M., ABADI, M., AND NEEDHAM, R.M. Authentication: A practical study in belief and action. In Proceedings of the 2nd Conference on Theoretical Aspects of Reasoning about Knowledge (Asilomar, Ca., Feb. 1988) M. Vardi, Ed. Morgan Kaufmann, Los Altos, Calif., 1988, pp. 325-342.
BURROWS , M. , ABADI , M. , AND NEEDHAM , R.M. A logic of authentication. Rep. 39 , Digital Equipment Corporation Systems Research Center , Palo Alto , Calif., Feb. 1989 . BURROWS, M., ABADI, M., AND NEEDHAM, R.M. A logic of authentication. Rep. 39, Digital Equipment Corporation Systems Research Center, Palo Alto, Calif., Feb. 1989.
CCITT. CCITT draft recommendation X.509. The directory-authentication framework, version 7 . CCITT , Gloucester , Nov. 1987 . CCITT. CCITT draft recommendation X.509. The directory-authentication framework, version 7. CCITT, Gloucester, Nov. 1987.
DEMILLO , R. A. , LYNCH , N. A. , AND MERRITT , M.J. Cryptographic protocols . In Proceedings o/the 14th ACM Symposium on the Theory of Computing ( San Francisco , May 1982 ), ACM, New York, 1982, pp. 383 - 400 . 10.1145/800070.802214 DEMILLO, R. A., LYNCH, N. A., AND MERRITT, M.J. Cryptographic protocols. In Proceedings o/the 14th ACM Symposium on the Theory of Computing (San Francisco, May 1982), ACM, New York, 1982, pp. 383-400. 10.1145/800070.802214
DOLEV , D. , AND YAO , A.C. On the security of public key protocols. IEEE Trans. Inf. Theory IT-29 , 2 ( Mar. 1983 ), 198 - 208 . DOLEV, D., AND YAO, A.C. On the security of public key protocols. IEEE Trans. Inf. Theory IT-29, 2 (Mar. 1983), 198-208.
HALPERN , J. Y. , AND MOSES , Y. O. Knowledge and common knowledge in a distributed environment . In Proceedings of the 3rd A CM Conference on the Principles of Distributed Computing ( Vancouver, British Columbia , Aug. 1984 ), ACM, New York, 1984, pp. 480 - 490 . 10.1145/800222.806735 HALPERN, J. Y., AND MOSES, Y. O. Knowledge and common knowledge in a distributed environment. In Proceedings of the 3rd A CM Conference on the Principles of Distributed Computing (Vancouver, British Columbia, Aug. 1984), ACM, New York, 1984, pp. 480-490. 10.1145/800222.806735
HALPERN , J. Y. , MOSES , Y. 0., AND TUTTLE , M. R. A knowledge-based analysis of zero knowledge (preliminary report) . In Proceedings of the 20th ACM Symposium on Theory of Computing ( Chicago, Ill. , May 1988 ), ACM, New York, 1988, pp. 132 - 147 . 10.1145/62212.62224 HALPERN, J. Y., MOSES, Y. 0., AND TUTTLE, M. R. A knowledge-based analysis of zero knowledge (preliminary report). In Proceedings of the 20th ACM Symposium on Theory of Computing (Chicago, Ill., May 1988), ACM, New York, 1988, pp. 132-147. 10.1145/62212.62224
MERRITT M. J. AND WOLPER P.L. States of knowledge in cryptographic protocols. Draft. MERRITT M. J. AND WOLPER P.L. States of knowledge in cryptographic protocols. Draft.
MILLER , S. P. , NEUMAN , C. , SCHILLER , J. I. , AND SALTZER , J.H. Kerberos authentication and authorization system . In Project Athena Technical Plan, Sect. E.2.1. MIT , Cambridge , Mass ., July 1987 . MILLER, S. P., NEUMAN, C., SCHILLER, J. I., AND SALTZER, J.H. Kerberos authentication and authorization system. In Project Athena Technical Plan, Sect. E.2.1. MIT, Cambridge, Mass., July 1987.
National Bureau of Standards. Data encryption standard. Fed. Inf. Process. Stand. Publ. 46 . National Bureau of Standards , Washington, D.C. , Jan. 1977 . National Bureau of Standards. Data encryption standard. Fed. Inf. Process. Stand. Publ. 46. National Bureau of Standards, Washington, D.C., Jan. 1977.
