Needham–Schroeder protocol

Results: 30



#Item
11Public-key cryptography / Internet privacy / Alice and Bob / Simple Mail Transfer Protocol / Oblivious transfer / Pretty Good Privacy / Needham–Schroeder protocol / Index of cryptography articles / Cryptography / Email / Cryptographic protocols

A Certified E-Mail Protocol Bruce Schneier Counterpane Systems James Riordan

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
12Data / Kerberos / Needham–Schroeder protocol / Information / Cryptographic nonce / Cyberwarfare / Cryptographic protocols / Cryptography / Computer network security

Secrecy Analysis in Protocol Composition Logic Arnab ROY a , Anupam DATTA b , Ante DEREK c , John C. MITCHELL a , and Jean-Pierre SEIFERT d a Stanford University, USA

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2007-11-29 16:22:57
13Information / Needham–Schroeder protocol / Cryptographic nonce / Challenge-response authentication / Burrows–Abadi–Needham logic / Communications protocol / Public-key cryptography / Transmission Control Protocol / Otway–Rees protocol / Cryptographic protocols / Data / Cryptography

A General Approach to the Verification of Cryptographic Protocols using Answer Set Programming James P. Delgrande, Torsten Grote, and Aaron Hunter School of Computing Science, Simon Fraser University,

Add to Reading List

Source URL: www.cs.sfu.ca

Language: English - Date: 2010-05-31 18:50:51
14Cyberwarfare / Kerberos / Ticket / Challenge-response authentication / Alice and Bob / Key distribution center / Public-key cryptography / Needham–Schroeder protocol / Neuman–Stubblebine protocol / Cryptography / Computer network security / Cryptographic protocols

YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467a: Cryptography and Computer Security Notes 24 (rev. 1) December 1, 2005

Add to Reading List

Source URL: zoo.cs.yale.edu

Language: English - Date: 2005-12-06 23:10:45
15Password / Key management / Challenge-response authentication / Needham–Schroeder protocol / Known-plaintext attack / Kerberos / Key / RSA / Password-authenticated key agreement / Cryptography / Cryptographic protocols / Public-key cryptography

© IEEE[removed]Protecting Poorly Chosen Secrets from Guessing Attacks Li Gong, T. Mark A. Lomas, Roger M. Needham, and Jerome H. Saltzer June 8, 1993

Add to Reading List

Source URL: web.mit.edu

Language: English - Date: 2011-05-18 00:11:55
16Dolev-Yao model / Public-key cryptography / Email / Needham–Schroeder protocol / Cryptographic protocols / Cryptography / Computing

Verifying Security Protocols: An ASM Approach. Dominik Haneberg, Holger Grandy, Wolfgang Reif, Gerhard Schellhorn Lehrstuhl f¨ ur Softwaretechnik und Programmiersprachen Institut f¨

Add to Reading List

Source URL: www.isse.uni-augsburg.de

Language: English - Date: 2014-12-01 09:19:17
17Information / Dolev-Yao model / Public-key cryptography / Communications protocol / Needham–Schroeder protocol / Transmission Control Protocol / Smart card / Email / Cryptographic protocols / Cryptography / Data

¨t Augsburg Universita Verifying Smart Card Applications: An ASM Approach. D.Haneberg, H.Grandy, W.Reif, G.Schellhorn

Add to Reading List

Source URL: www.isse.uni-augsburg.de

Language: English - Date: 2014-12-01 09:19:28
18Information / Challenge-response authentication / Password authentication protocol / Public-key cryptography / Cryptographic nonce / Needham–Schroeder protocol / Otway–Rees protocol / Cryptographic protocols / Cryptography / Data

NRL Release Number[removed]Environmental Requirements for Authentication Protocols Ran Canetti1 and Catherine Meadows2 and Paul Syverson2 1

Add to Reading List

Source URL: www.nrl.navy.mil

Language: English - Date: 2013-04-29 10:13:46
19Burrows–Abadi–Needham logic / Needham–Schroeder protocol / Public-key cryptography / Cryptographic nonce / XTR / Deniable authentication / Security protocol notation / Wide Mouth Frog protocol / Cryptographic protocols / Cryptography / Data

NRL Release Number[removed]The Logic of Authentication Protocols ?

Add to Reading List

Source URL: www.nrl.navy.mil

Language: English - Date: 2013-04-29 11:09:46
20Burrows–Abadi–Needham logic / Needham–Schroeder protocol / Communications protocol / Model theory / Quantifier elimination / Security protocol notation / Cryptographic protocols / Data / Information

A (restricted) quantifier elimination for security protocols ? R. Ramanujam ∗ The Institute of Mathematical Sciences, C.I.T. Campus, Taramani, Chennai[removed], India S.P. Suresh

Add to Reading List

Source URL: www.imsc.res.in

Language: English - Date: 2006-08-04 05:49:00
UPDATE