共 50 条
- [22] Safe simplifying transformations for security protocols or not just the needham schroeder public key protocol PROCEEDINGS OF THE 12TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, 1999, : 32 - 43
- [23] Safe simplifying transformations for security protocols or not just the Needham Schroeder public key protocol Proc Comput Secur Found Workshop, (32-43):
- [25] Mobile IP registration protocol: a security attack and new secure minimal public-key based authentication Int Symp Parall Archit Algorithms Networks I SPAN, (364-369):
- [26] Mobile IP registration protocol: A security attack and new secure minimal public-key based authentication FOURTH INTERNATIONAL SYMPOSIUM ON PARALLEL ARCHITECTURES, ALGORITHMS, AND NETWORKS (I-SPAN'99), PROCEEDINGS, 1999, : 364 - 369
- [27] An Image Based Authentication System-Using Needham Schroeder Protocol INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (11): : 135 - 140
- [29] A denial-of-service resistant public-key authentication and key establishment protocol CONFERENCE PROCEEDINGS OF THE 2002 IEEE INTERNATIONAL PERFORMANCE, COMPUTING, AND COMMUNICATIONS CONFERENCE, 2002, : 171 - 178
- [30] A public-key based authentication and key establishment protocol coupled with a client puzzle JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE AND TECHNOLOGY, 2003, 54 (09): : 810 - 823