Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article
Free access

A lesson on authentication protocol design

Published: 01 July 1994 Publication History
First page of PDF

References

[1]
[1] M. Abadi. Private communication. March 1993.
[2]
[2] M. Abadi and R. Needham. Good engineering practice for security in cryptographic protocols. Manuscript, November 1993.
[3]
[3] R. Bird, I. Gopal, A. Herzberg, P.A. Janson, S. Kutten, R. Molva, and M. Yung. Systematic design of a family of attack-resistant authentication protocols. IEEE Journal on Selected Areas in Communications, 11(5):679-693, June 1993.
[4]
[4] M. Burrows, M. Abadi, and R.M. Needham. A logic of authentication. Technical Report 39, Systems Research Center, Digital Equipment Corporation, February 28 1989. Revised February 22, 1990. An abbreviated version appears in [5].
[5]
[5] M. Burrows, M. Abadi, and R.M. Needham. A logic of authentication. ACM Transactions on Computer Systems, 8(1):18-36, February 1990.
[6]
[6] M. Pease, R. Shostak, and L. Lamport. Reaching agreement in the presence of faults. Journal of the ACM, 27(2):228-234, April 1980.
[7]
[7] E. Snekkenes. Roles in cryptographic protocols. In Proceedings of the 13th IEEE Symposium on Research in Security and Privacy, pages 105-119, Oakland, California, May 4-6 1992.
[8]
[8] P. Syverson. On key distribution protocols for repeated authentication. ACM Operating Systems Review, 27(3):24-30, October 1993.
[9]
[9] T.Y.C. Woo and S.S. Lam. Authentication for distributed systems. Computer , 25(1):39-52, January 1992. See also "Authentication" revisited. Computer, 25(3):10-10, March 1992.
[10]
[10] T.Y.C. Woo and S.S. Lam. A semantic model for authentication protocols. In Proceedings of the 14th IEEE Symposium on Research in Security and Privacy, pages 178-194, Oakland, California, May 24-26 1993.
[11]
[11] T.Y.C. Woo and S.S. Lam. Verifying authentication protocols: Methodology and example. In Proceedings of the International Conference on Network Protocols, pages 36-45, San Francisco, California, October 19-22 1993.
[12]
[12] CCITT Recommendation X.500 The Directory--Overview of concepts, models, and services, 1988.

Cited By

View all
  • (2024)Automatic generation of security protocols attacks specifications and implementationsCyber Security and Applications10.1016/j.csa.2024.1000382(100038)Online publication date: 2024
  • (2023)Methodology of Testing the Security of Cryptographic Protocols Using the CMMTree FrameworkApplied Sciences10.3390/app13231266813:23(12668)Online publication date: 25-Nov-2023
  • (2022)Timed Automata as a Formalism for Expressing Security: A Survey on Theory and PracticeACM Computing Surveys10.1145/353496755:6(1-36)Online publication date: 7-Dec-2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM SIGOPS Operating Systems Review
ACM SIGOPS Operating Systems Review  Volume 28, Issue 3
July 1994
61 pages
ISSN:0163-5980
DOI:10.1145/182110
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 July 1994
Published in SIGOPS Volume 28, Issue 3

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)223
  • Downloads (Last 6 weeks)28
Reflects downloads up to 15 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Automatic generation of security protocols attacks specifications and implementationsCyber Security and Applications10.1016/j.csa.2024.1000382(100038)Online publication date: 2024
  • (2023)Methodology of Testing the Security of Cryptographic Protocols Using the CMMTree FrameworkApplied Sciences10.3390/app13231266813:23(12668)Online publication date: 25-Nov-2023
  • (2022)Timed Automata as a Formalism for Expressing Security: A Survey on Theory and PracticeACM Computing Surveys10.1145/353496755:6(1-36)Online publication date: 7-Dec-2022
  • (2021)SAT and SMT-Based Verification of Security Protocols Including Time AspectsSensors10.3390/s2109305521:9(3055)Online publication date: 27-Apr-2021
  • (2021)An Interactive Tool for Designing End-To-End Secure WorkflowsInformation and Communication Technology for Competitive Strategies (ICTCS 2020)10.1007/978-981-16-0882-7_42(489-498)Online publication date: 6-Jul-2021
  • (2020)VerSecTis - An Agent based Model Checker for Security ProtocolsProceedings of the 19th International Conference on Autonomous Agents and MultiAgent Systems10.5555/3398761.3399096(2123-2125)Online publication date: 5-May-2020
  • (2019)SMT Solvers as Efficient Tools for Automatic Time Properties Verification of Security Protocols2019 20th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT)10.1109/PDCAT46702.2019.00065(320-327)Online publication date: Dec-2019
  • (2019)A Fast Method for Security Protocols VerificationComputer Information Systems and Industrial Management10.1007/978-3-030-28957-7_43(523-534)Online publication date: 19-Sep-2019
  • (2019)Efficient Verification of Security Protocols Time Properties Using SMT SolversKinderchirurgie10.1007/978-3-030-20005-3_3(25-35)Online publication date: 28-Apr-2019
  • (2018)A Mutual Authentication Method For Local MAC Address Allocation2018 Sixth International Conference on Advanced Cloud and Big Data (CBD)10.1109/CBD.2018.00050(237-242)Online publication date: Aug-2018
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media