THE INTERROGATOR - PROTOCOL SECURITY ANALYSIS

被引:71
作者
MILLEN, JK
CLARK, SC
FREEDMAN, SB
机构
关键词
D O I
10.1109/TSE.1987.233151
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
引用
收藏
页码:274 / 288
页数:15
相关论文
共 10 条
[1]   ON COMMUNICATING FINITE-STATE MACHINES [J].
BRAND, D ;
ZAFIROPULO, P .
JOURNAL OF THE ACM, 1983, 30 (02) :323-342
[2]  
Clocksin W. F., 1981, Programming in Prolog
[3]   TIMESTAMPS IN KEY DISTRIBUTION PROTOCOLS [J].
DENNING, DE ;
SACCO, GM .
COMMUNICATIONS OF THE ACM, 1981, 24 (08) :533-536
[4]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[5]  
DOLEV D, 1981, STANCS81854 STANF U
[6]  
MILLEN JK, 1984 P S SEC PRIV IE
[7]   USING ENCRYPTION FOR AUTHENTICATION IN LARGE NETWORKS OF COMPUTERS [J].
NEEDHAM, RM ;
SCHROEDER, MD .
COMMUNICATIONS OF THE ACM, 1978, 21 (12) :993-999
[8]  
PURDY GB, 1982 P S SEC PRIV IE
[9]  
SIMMONS GJ, 1985 P S SEC PRIV IE
[10]  
VOYDOCK VL, 1983, COMPUT SURVEYS, V15