References
- R. Needham and M.D. Schroeder. 'Using encryption for authentication in large network of computers'. Communication of the ACM, vol.21, no.12, pp. 993-999, 1978 https://doi.org/10.1145/359657.359659
- G Lowe. 'An attack on the needham-schroeder public key authentication protocol'. Information Processing letters, vol.56, no.3, pp. 131-133, 1995 https://doi.org/10.1016/0020-0190(95)00144-2
- M. Abadi and R. Needham. 'Prudent engineering practice for cryptographic protocols' IEEE Transactions on Software Engineering, vol.2l , no. 1, pp 6-15, Jan. 1996
- D.Dolev and A.C.Yao. 'On the security of public key protocols'. IEEE Transactions on Information Theory, vol.29, no.2, 1983
- M. A M. Burrows and R. Needham. 'A logic of authentication'. Proc. Royal Soc. London A, vol. 426, pp. 233-271, 1989 https://doi.org/10.1098/rspa.1989.0125
- P. Syverson and P. van Oorschot. 'On unifying some cryptographic protocol logics'. IEEE Computer Society Symposium on Research in Security and Privacy, 16-18 May 1994, pp. 14-28
- Glowe.' Toward a completeness result for model checking of security protocol'. pp. 1-48, June 1999
- F. Fabrega, J. Herzog, and J. Guttman.'Strand spaces: why is a security protocol correct?'. Proc. 1998 IEEE Symposium on Security and Privacy, 3-6 May 1998, pp. 160-171
- J. Guttman and F. Thayer. 'Authentication tests'. Proc.lEEE Symposium on Security and Privacy, 14-17 May 2000, pp. 96-109
- M. Bellare, P. Rogaway. 'Random oracles are practical: a paradigm for designing efficient protocols'. In First ACM Conference on Computer and Communications Security New York: ACM Press, 1993, 62-73
- M. Bellare, P. Rogaway. 'Entity authentication and key distribution'.' Proc. of CRYPTO'93, LNCS 773. 1993, pp 232-249
- W. Mao, Modem Cryptography' Theory and Practice. English reprint Copyright by PEARSON EDUCATION NORTH ASIA LIMITED and Publishing House of Electronic Industry, 2004
- S. Goldwasser and S. Micali. 'Probabilistic encryption.' JCSS, vol.28, no.2, pp. 270-299, April 1984
- G Lowe. 'Breaking and fixing the needham-schroeder public key protocol using FDR'. Proc. of TACAS, vol. 1055, Springer Verlag, 1996, pp. 147-166
- R. Canetti and H. Krawczyk. 'Analysis of key-exchange protocols and their use for building secure channels'. Proc, of EUROCRYPT 2001, LNCS 2045, 2001, pp. 453-474
- L. Dong, K. Chen, X. Lai. 'Belief Multisets for Cryptographic Protocol Analysis'. Journal of Software (To Appear)
- L. Dong, K. Chen, Y. Zheng, X. Hong. 'The Guarantee of Authentication Protocol Security ' Journal of Shanghai JiaoTong University (in Chinese), vol. 42, no.4, pp.518- 522, 2008
- Otway D, and O. Rees. 'Efficient and Timely Mutual Authentication'. Operating Systems Review, vol.21, pp. 810, 1987
- D. Denning and G. Sacco. 'Timestamps in key distribution protocols'. Communication of the ACM, vol.24, no.8, pp. 533-536, 1978 https://doi.org/10.1145/358722.358740