A LOGIC OF AUTHENTICATION

被引:244
作者
BURROWS, M [1 ]
ABADI, M [1 ]
NEEDHAM, RM [1 ]
机构
[1] UNIV CAMBRIDGE,COMP LAB,CAMBRIDGE CB2 3QG,ENGLAND
来源
PROCEEDINGS OF THE ROYAL SOCIETY OF LONDON SERIES A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES | 1989年 / 426卷 / 1871期
关键词
D O I
10.1098/rspa.1989.0125
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
引用
收藏
页码:233 / 271
页数:39
相关论文
共 20 条
[1]   A KEY DISTRIBUTION PROTOCOL USING EVENT MARKERS [J].
BAUER, RK ;
BERSON, TA ;
FEIERTAG, RJ .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 1983, 1 (03) :249-255
[2]  
BURROWS M, 1988, 2ND P C THEOR ASP RE, P325
[3]  
DEMILLO R, 1982, 14TH P ACM S THEOR C, P383
[4]   TIMESTAMPS IN KEY DISTRIBUTION PROTOCOLS [J].
DENNING, DE ;
SACCO, GM .
COMMUNICATIONS OF THE ACM, 1981, 24 (08) :533-536
[5]   ON THE SECURITY OF PUBLIC KEY PROTOCOLS [J].
DOLEV, D ;
YAO, AC .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :198-208
[6]  
HALPERN JY, 1986, 18TH P ACM S THEOR C, P304
[7]  
HALPERN JY, 1988, 20TH P ACM S THEOR C, P132
[8]  
HALPERN JY, 1984, 3RD P ACM C PRINC DI, P480
[9]   AN AXIOMATIC BASIS FOR COMPUTER PROGRAMMING [J].
HOARE, CAR .
COMMUNICATIONS OF THE ACM, 1969, 12 (10) :576-&
[10]  
MERRITT MJ, 1989, STATES KNOWLEDGE CRY