Analyzing the Needham-Schroeder public-key protocol: A comparison of two approaches

被引:0
|
作者
Meadows, C.A.
机构
来源
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [21] A client puzzle based public-key authentication protocol
    Fung, CK
    Lee, MC
    Wong, MY
    SMART NETWORKS, 2002, 84 : 263 - 277
  • [22] A New Trapdoor in Knaspsack Public-Key Cryptosystem with Two Sequences as the Public Key
    Murakami, Yasuyuki
    Nasako, Takeshi
    Kasahara, Masao
    THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS, 2008, : 357 - +
  • [23] A denial-of-service resistant public-key authentication and key establishment protocol
    Fung, CK
    Lee, MC
    CONFERENCE PROCEEDINGS OF THE 2002 IEEE INTERNATIONAL PERFORMANCE, COMPUTING, AND COMMUNICATIONS CONFERENCE, 2002, : 171 - 178
  • [24] Interactive identification protocol based on a quantum public-key cryptosystem
    Wu, Chenmiao
    Yang, Li
    QUANTUM AND NONLINEAR OPTICS III, 2014, 9269
  • [25] A public-key based authentication and key establishment protocol coupled with a client puzzle
    Lee, MC
    Fung, CK
    JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE AND TECHNOLOGY, 2003, 54 (09): : 810 - 823
  • [26] Performance evaluation of public-key cryptosystem operations in WTLS protocol
    Levi, A
    Savas, E
    EIGHTH IEEE INTERNATIONAL SYMPOSIUM ON COMPUTERS AND COMMUNICATION, VOLS I AND II, PROCEEDINGS, 2003, : 1245 - 1250
  • [27] An improved way on Kerberos protocol based on public-key algorithms
    Liu, K.
    Qing, S.
    Meng, Y.
    Ruan Jian Xue Bao/Journal of Software, 2001, 12 (06): : 872 - 877
  • [28] An extended logic for analyzing timed-release public-key protocols
    Kudo, M
    Mathuria, A
    INFORMATION AND COMMUNICATON SECURITY, PROCEEDINGS, 1999, 1726 : 183 - 198
  • [29] Optical Asymmetric Cryptography Modifying the RSA Public-key Protocol
    Jeon, Seok Hee
    Gil, Sang Keun
    CURRENT OPTICS AND PHOTONICS, 2020, 4 (02) : 103 - 114
  • [30] New security protocol for mobile agent based on public-key infrastructure
    Mazlan, MA
    Dibba, M
    Samsudin, A
    Kamarulhali, H
    6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL XII, PROCEEDINGS: INDUSTRIAL SYSTEMS AND ENGINEERING II, 2002, : 96 - 101