ON THE SECURITY OF PUBLIC KEY PROTOCOLS

被引:3413
作者
DOLEV, D [1 ]
YAO, AC [1 ]
机构
[1] STANFORD UNIV,DEPT COMP SCI,STANFORD,CA 94305
关键词
D O I
10.1109/TIT.1983.1056650
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页码:198 / 208
页数:11
相关论文
共 11 条
[1]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[2]  
DIFFIE W, 1976 P AFIPS NCC MON, P109
[3]   THE BYZANTINE GENERALS STRIKE AGAIN [J].
DOLEV, D .
JOURNAL OF ALGORITHMS, 1982, 3 (01) :14-30
[4]   PROTECTION IN OPERATING-SYSTEMS [J].
HARRISON, MA ;
RUZZO, WL ;
ULLMAN, JD .
COMMUNICATIONS OF THE ACM, 1976, 19 (08) :461-470
[5]  
Hopcroft J.E., 1969, FORMAL LANGUAGES THE
[6]   LINEAR TIME ALGORITHM FOR DECIDING SUBJECT SECURITY [J].
LIPTON, RJ ;
SNYDER, L .
JOURNAL OF THE ACM, 1977, 24 (03) :455-464
[7]  
Merkle RC., 1980, PROTOCOLS PUBLIC KEY
[8]   USING ENCRYPTION FOR AUTHENTICATION IN LARGE NETWORKS OF COMPUTERS [J].
NEEDHAM, RM ;
SCHROEDER, MD .
COMMUNICATIONS OF THE ACM, 1978, 21 (12) :993-999
[9]   REACHING AGREEMENT IN THE PRESENCE OF FAULTS [J].
PEASE, M ;
SHOSTAK, R ;
LAMPORT, L .
JOURNAL OF THE ACM, 1980, 27 (02) :228-234
[10]  
POPEK GJ, 1978, F SECURE COMPUTATION