共 50 条
- [22] A parameterized analysis of public-key protocols:Needham-Schroeder and Kerberos-5 ICON: 2006 IEEE INTERNATIONAL CONFERENCE ON NETWORKS, VOLS 1 AND 2, PROCEEDINGS: NETWORKING -CHALLENGES AND FRONTIERS, 2006, : 294 - +
- [24] An Image Based Authentication System-Using Needham Schroeder Protocol INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (11): : 135 - 140
- [26] A computational analysis of the Needham-Schroeder-(Lowe) protocol 16TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2003, : 248 - 262
- [28] Safe simplifying transformations for security protocols or not just the needham schroeder public key protocol PROCEEDINGS OF THE 12TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, 1999, : 32 - 43
- [29] Safe simplifying transformations for security protocols or not just the Needham Schroeder public key protocol Proc Comput Secur Found Workshop, (32-43):
- [30] A cryptographically sound security proof of the Needham-Schroeder-Lowe public-key protocol FST TCS 2003: FOUNDATIONS OF SOFTWARE TECHNOLOGY AND THEORETICAL COMPUTER SCIENCE, 2003, 2914 : 1 - 12