ON THE SECURITY OF PING-PONG PROTOCOLS

被引:45
作者
DOLEV, D
EVEN, S
KARP, RM
机构
[1] UNIV CALIF BERKELEY,EECS,DIV COMP SCI,BERKELEY,CA 94720
[2] TECHNION ISRAEL INST TECHNOL,DEPT COMP SCI,HAIFA,ISRAEL
来源
INFORMATION AND CONTROL | 1982年 / 55卷 / 1-3期
关键词
D O I
10.1016/S0019-9958(82)90401-6
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
引用
收藏
页码:57 / 68
页数:12
相关论文
共 5 条
[1]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[2]  
DOLEV D, 1983, IEEE T INFORMATION T, V30, P198
[3]   USING ENCRYPTION FOR AUTHENTICATION IN LARGE NETWORKS OF COMPUTERS [J].
NEEDHAM, RM ;
SCHROEDER, MD .
COMMUNICATIONS OF THE ACM, 1978, 21 (12) :993-999
[4]  
RIVEST RL, 1978, COMMUN ACM, V21, P120, DOI [10.1145/359340.359342, 10.1145/357980.358017]
[5]   TREE-MANIPULATING SYSTEMS AND CHURCH-ROSSER THEOREMS [J].
ROSEN, BK .
JOURNAL OF THE ACM, 1973, 20 (01) :160-187