1 |
D. Park, Cryptographic Protocols for Third Generation Mobile Communication Systems, PhD thesis, Queensland University of Technology, 2000
|
2 |
R. Gorrieri, F. Martinelli, and M. Petrocchi, 'A Formalization of Credit and Responsibility', Proceedings of SASYFT 2004. Available from http://www.iit.cnr.it/ staff/fabio.martinelli/
|
3 |
A. Durante, R. Focardi, and R. Gorrieri, 'CVS at Work: A Report on New Failures upon Some Cryptographic Protocols', Proceedings of MMA-ACNS'01, Springer LNCS 2502, May 2001
|
4 |
A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography, CRC Press, 1997
|
5 |
M. Abadi, 'Two facets of authentication', Proceedings of 11th IEEE CSFW, pp. 27-33, 1998
|
6 |
M. Abadi, 'Security Protocols and their Properties', Foundations of Secure Computation, NATO Science Series, IOS Press, Volume for the 20th International Summer School on Foundations of Secure Computation, pp. 39-60, 2000
|
7 |
M. Burrows, M. Abadi, and R. Needham, 'A logic of authentication', DEC Systems Research Center, Report 39, revised February 22, 1990
|
8 |
C. Boyd, 'Towards extensional goals in authentication protocols', DIMACS Workshop on Cryptographic Protocol Design and Verification, 1997
|