315 references, last updated Fri Apr 11 16:37:14 2003
- [1]
- Martín Abadi and
Andrew D. Gordon.
A calculus for cryptographic protocols: the Spi Calculus.
In Proceedings of the 4th ACM Conference on Computer and Communications
Security, pages 129-137, Zurich, Switzerland, April 1-4, 1997.
- [2]
- Martín Abadi and Roger
Needham.
Prudent engineering practice for cryptographic protocols.
IEEE Transactions on Software Engineering, 22(1):6-15, January
1996.
- [3]
- Martín Abadi and
M. Tuttle.
A semantics for a logic of authentication.
In Proceedings of the 10th Annual ACM Symposium on Principles of
Distributed Computing, pages 201-216, 1991.
- [4]
- Michel Abdalla and
Matthew Franklin.
Secure group communication over partially connected networks.
In DISC'01, 2001.
- [5]
- William A. Adamson, Jim
Rees, and Peter Honeyman.
Joining security realms: A single login for NetWare and Kerberos.
In Proceedings of the 2nd International Workshop on Services in
Distributed and Networked Environments, pages 2-10, June 1995.
- [6]
- William A. Adamson, Jim
Rees, and Peter Honeyman.
Joining security realms: A single login for NetWare and Kerberos.
Technical Report CITI TR 95-1, University of Michigan, Ann Arbor, MI, USA,
February 1995.
(appeared in Proc. 2nd Intl. Workshop on Services in Distributed and Networked
Environments).
- [7]
- J.D. Tygar Alma Whitten.
Usability of security: A case study.
Technical Report CMU-CS-98-155, Computer Science Department, School of Computer
Science, Carnegie Mellon University, December 1998.
- [8]
- Yair Amir, Giuseppe Ateniese,
Damian Hasse, Yongdae Kim, Cristina Nita-Rotaru, Theo Schlossnagle, John
Schultz, Jonathan Stanton, and Gene Tsudik.
Secure group
communication in asynchronous networks with failures: Integration and
experiments.
In International Conference on Distributed Computing Systems,
1999.
- [9]
- Yair Amir, Kim Yongdae, Cristina
Nita-Rotaru, and Gene Tsudik.
On the performance
of group key agreement protocols.
Technical Report CNDS-2001-5, Center for Networking and Distributed Systems,
Johns Hopkins University, November 2001.
- [10]
- Ross Anderson and Markus
Kuhn.
Tamper resistance a cautionary note.
In Proceedings of the Second Usenix Workshop on Electronic
Commerce, pages 1-11, November 1996.
- [11]
- Ross Anderson and Markus
Kuhn.
Low cost attacks on tamper resistant devices.
In Security Protocols, 5th International Workshop, LNCS 1361,
pages 125-136, April 7-9, 1997.
- [12]
- R. Anderson, F. Bergadano,
B. Crispo, J. Lee, C. Manifavas, and R. Needham.
A new family of authentication protocols.
Operating Systems Review, 32(4):9-20, October 1998.
- [13]
- Ross J. Anderson.
Why cryptosystems fail.
Communications of the ACM, 37(11):97-102, November 1994.
- [14]
- Tal Anker, Gregory V. Chockler,
Danny Dolev, and Idit Keidar.
Scalable
group membership services for novel applications.
In Marios Mavronicolas, Michael Merritt, and Nir Shavit, editors,
Proceedings of the DIMACS Workshop on Networks in Distributed
Computing, 1998.
- [15]
- Andrew W. Appel and
Edward W. Felten.
Proof-carrying authentication.
In Proceedings of the 6th ACM Conference on Computer and Communications
Security, pages 52-62, Singapore, November 1-4, 1999.
- [16]
- Giuseppe Ateniese, Michael
Steiner, and Gene Tsudik.
Authenticated group key agreement and friends.
In Proceedings of the 5th ACM Conference on Computer and Communications
Security, pages 17-26, November 1998.
- [17]
- Tuomas Aura, Pekka Nikander, and
Jussipekka Leiwo.
DOS-resistant authentication with client puzzles.
In Proceedings of the 8th International Workshop on Security
Protocols, LNCS 2133, pages 170-177, April 2000.
- [18]
- Ashar Aziz and Whitfield
Diffie.
Privacy and authentication for wireless local area networks.
IEEE Personal Communications, First Quarter:25-31, 1994.
- [19]
- Ashar Aziz and Martin
Patterson.
Simple Key-management for Internet Protocols (SKIP).
In Proceedings of INET'95, 1995.
- [20]
- Joonsang Baek, Kwangjo Kim, and
Tsutomu Matsumoto.
On the
significance of unknown key-share attacks: How to cope with them?.
In Symposium on Cryptography and Information Security (SCIS'00),
January 26-28, 2000.
- [21]
- W. C. Barker, P. Cochrane, and
M. Branstad.
Embedding cryptography into a Trusted Mach system.
In Fourth Aerospace Computer Security Applications Conference,
pages 379-383, Silver Spring, MD, USA, December 12-16, 1988. IEEE Computer
Society Press.
- [22]
- J. P. Bekmann and
P. de Goede.
Multi-dimensional security protocol engineering using SPEAR.
Technical Report CS97-20-00, Department of Computer Science, University of Cape
Town, South Africa, October 2, 1997.
- [23]
- J. P. Bekmann, P. de Goede,
and Andrew Hutchison.
SPEAR: A
security protocol engineering and analysis resource.
In DIMACS Workshop on Design and Formal Verification of Security
Protocols, September 3-5, 1997.
- [24]
- Giampaolo Bella and
Lawrence C. Paulson.
Using Isabelle to prove properties of the Kerberos authentication
system.
In Proceedings of the DIMACS Workshop on Design and Formal Verification
of Security Protocols, Rutgers University, September 1997.
- [25]
- Giampaolo Bella and
Lawrence C. Paulson.
Kerberos Version IV: Inductive analysis of the secrecy goals.
In Jean-Jacques Quisquater, Yves Deswarte, Catherine Meadows, and Dieter
Gollmann, editors, 5rd European Symposium on Research in Computer
Security, ESORICS'98, LNCS 1485, pages 361-375, September 16-18,
1998.
- [26]
- Mihir Bellare and Phillip
Rogaway.
Provable secure session key distribution: the three party case.
In Proceedings of the 27th Annual ACM Symposium on Theory of
Computing, pages 57-66, Las Vegas, NV, USA, May 29-1, 1995.
- [27]
- Steve Bellovin and
Michael Merritt.
Limitations of the Kerberos authentication system.
In USENIX Winter Conference, 1991.
- [28]
- Daniel M. Berry.
Towards a formal basis for the formal development method and the Ina Jo
specification language.
IEEE Transactions on Software Engineering, 13(2):184-200,
February 1987.
- [29]
- Elisa Bertino, Francesco
Buccafurri, Elena Ferrari, and Pasquale Rullo.
An authorization model and its formal semantics.
In Jean-Jacques Quisquater, Yves Deswarte, Catherine Meadows, and Dieter
Gollmann, editors, 5rd European Symposium on Research in Computer
Security, ESORICS'98, LNCS 1485, pages 127-142, September 16-18,
1998.
- [30]
- V. Bharghavan and
C. V. Ramamoorthy.
Security issues in mobile communications.
In International Symposium on Autonomous Decentralized Systems'95,
April 1995.
- [31]
- V. Bharghavan.
Secure wireless LANs.
In Proceedings of the 2nd ACM Conference on Computer and communications
security, pages 10-17, November 1994.
- [32]
- V. Bharghavan.
Performance analysis of a medium access protocol for wireless packet networks.
In IEEE Performance and Dependability Symposium '98, August
1998.
- [33]
- Ray Bird, Inder Gopal, Amir
Herzberg, Phil Janson, Shay Kutten, Refik Molva, and Moti Yung.
Systematic design of a
family of attack resistant protocols.
IEEE Journal on Selected Areas in Communications, 11(5):679-693,
June 1993.
- [34]
- Ray Bird, Inder Gopal, Amir
Herzberg, Phil Janson, Shay Kutten, Refik Molva, and Moti Yung.
The KryptoKnight family of light-weight protocols for authentication and key
distribution.
IEEE/ACM Transactions on Networking, 3(1):31-41, February
1995.
- [35]
- Simon Blake-Wilson
and Alfred Menezes.
Authenticated Diffie-Hellman key agreement protocols.
In Proceedings of the 5th Annual Workshop on Selected Areas in
Cryptography (SAC'98), LNCS 1556, pages 339-361, 1999.
- [36]
- Chiara Bodei, Pierpaolo Degano,
Flemming Nielson, and Hanne Riis Nielson.
Security analysis using flow logics.
Bulletin of the European Association for Theoretical Computer Science
EATCS, pages 112-129, February 2000.
- [37]
- Dominique Bolignano.
An approach to the formal verification of cryptographic protocols.
In Proceedings of the 3rd ACM Conference on Computer and Communications
Security, CCS'96, pages 106-118, March 14-15, 1996.
- [38]
- Dominique Bolignano.
Towards a mechanization of cryptographic protocol verification.
In Orna Grumberg, editor, Proceedings of CAV'97, LNCS 1254, pages
131-142. Springer Verlag, June 22-25, 1997.
- [39]
- T. Bolognesi and
E. Brinksma.
Introduction to the ISO specification language LOTOS.
Computer Networks and ISDN Systems, 14(1):25-59, 1987.
- [40]
- Mike Bond and Ross
Anderson.
API-level attacks on embedded systems.
IEEE Computer, October 2001.
- [41]
- Dan Boneh and Hovav
Shacham.
Fast variants of RSA.
CryptoBytes Technical Newsletter, 5(1):1-9, Winter/Spring
2002.
- [42]
- Nikita Borisov, Ian Goldberg,
and David Wagner.
Intercepting
mobile communications: The insecurity of 802.11.
In Conference on Mobile Computing and Networking (MOBICOM'01),
July16-21, 2001.
- [43]
- Antoon Bosselaers,
René Govaerts, and Joos Vandewalle.
Fast
hashing on the Pentium.
In Advances in Cryptology, Proceedings Crypto'96, LNCS 1109, pages
298-312. Springer Verlag, 1996.
- [44]
- Colin Boyd and Wenbo Mao.
Designing secure key exchange protocols.
In Dieter Gollmann, editor, 3rd European Symposium on Research in
Computer Security, ESORICS'94, LNCS 875, pages 93-105, November 7-9,
1994.
- [45]
- Colin Boyd and Anish
Mathuria.
Key establishment protocols for secure mobile communications: A selective
survey.
In Colin Boyd and Ed Dawson, editors, 3rd Australasian Conference,
ACISP'98, LNCS 1438, pages ??--??, July 13-15, 1998.
- [46]
- Colin Boyd.
A class of
flexible and efficient key management protocols.
In Proceedings of 9th IEEE Computer Security Foundations Workshop,
pages 2-8, 1996.
- [47]
- Colin Boyd.
A framework for
design of key establishment protocols.
In Information Security and Privacy, LNCS 1172, pages 146-157,
1996.
- [48]
- Colin Boyd.
Extensional goals in authentication protocols.
In Proceedings of the DIMACS Workshop on Design and Formal Verification
of Security Protocols, Rutgers University, September 1997.
- [49]
- Stephen H. Brackin, Catherine
Meadows, and Jonathan Millen.
CAPSL interface for the
NRL protocol analyzer.
In 2nd IEEE Symposium on Application-Specific Systems and Software
Engineering Technology (ASSET'99), pages ??--?? (10 pages), March
1999.
- [50]
- Stephen H. Brackin.
An interface
specification language for automatically analyzing cryptographic
protocols.
In Internet Society Symposium on Network and Distributed System
Security, page 12 pages, February 1997.
- [51]
- Stephen H. Brackin.
A state-based HOL
theory of protocol failure.
Technical Report ATR 98007, Arca Systems / Exodus Communications, 1997.
- [52]
- Stephen H. Brackin.
Automatic analysis of
cryptographic protocols.
Technical Report ATR 99057, Arca Systems / Exodus Communications, July 1999.
- [53]
- Emmanuel Bresson, Olivier
Chevassut, David Pointcheval, and Jean-Jacques Quisquater.
Provably authenticated group diffie-hellman key exchange.
In Proceedings of the 8th ACM Conference on Computer and Communications
Security, pages 255-264, November 2001.
- [54]
- Emmanuel Bresson, Olivier
Chevassut, David Pointcheval, and Jean-Jacques Quisquater.
Provably authenticated group diffie-hellman key exchange - the dynamic case.
In Advances in Cryptology - ASIACRYPT 2001, LNCS 2248, pages
290-309, December 2001.
- [55]
- Jeremy Bryans and Steve
Schneider.
CSP, PVS, and a recursive authentication protocol.
In DIMACS Workshop on Design and Formal Verification of Security
Protocols, page 20 pages, September 3-5, 1997.
- [56]
- Michael Burrows, Martín
Abadi, and Roger Needham.
A logic of authentication.
Technical Report 39, Digital Equipment Corporation Systems Research Center,
Palo Alto, California, USA, February 1989.
- [57]
- Michael Burrows, Martín
Abadi, and Roger Needham.
A logic of authentication.
ACM Transactions on Computer Systems, 8(1):18-36, February
1990.
- [58]
- Levente Buttyán,
Sebastian Staamann, and Uwe G. Wilhelm.
A simple logic for
authentication protocol design.
In Proceedings of the 11th IEEE Computer Security Foundation
Workshop, June 9-11, 1998.
- [59]
- Levente Buttyán.
Formal methods in the
design of cryptographic protocols (state of the art).
Technical Report SSC/1999/38, Swiss Federal Institute of Technology (EPFL),
Lausanne, Switzerland, November 1999.
- [60]
- Christian Cachin, Klaus
Kursawe, and Victor Shoup.
Random oracles in
Constantinople: Practical asynchronous byzantine agreement using
cryptography.
In Proc. 19th ACM Symposium on Principles of Distributed Computing (PODC
2000), pages 123-132, July 2000.
- [61]
- C. Cachin, K. Kursawe,
F. Petzold, and Victor Shoup.
Secure and efficient
asynchronous broadcast protocols.
Technical Report RZ 3317, IBM Research, 2001.
- [62]
- Christian Cachin.
Distributing trust on
the Internet.
In International Conference on Dependable Systems and Networks
(DSN'01), pages 183-192, July 1-4, 2001.
- [63]
- CERT.
CERT advisory: TCP
SYN flooding and IP spoofing attacks.
Technical Report CA-1996-21, Carnegie Mellon Software Engineering Institute,
September 19, 1996.
http://www.cert.org/advisories/CA-1996-21.html.
- [64]
- I. Cervesato, N. Durgin,
P. Lincoln, J. Mitchell, and A. Scedrov.
A meta-notation
for protocol analysis.
In Proceedings of the 12th IEEE Computer Security Foundations
Workshop, June 1999.
- [65]
- Shaw-Cheng Chuang.
Securing ATM networks.
In Proceedings of the 3rd ACM Conference on Computer and Communications
Security, CCS'96, pages 19-30, March 1996.
- [66]
- Edmund M. Clarke, Somesh
Jha, and Will Marrero.
A machine checkable
logic of knowledge for specifying security properties of electronic commerce
protocols.
In Workshop on Formal Methods and Security Protocols, 1998.
- [67]
- Edmund M. Clarke, Somesh Jha,
and Will Marrero.
Using state
exploration and a natural deduction style message derivation engine to verify
security protocols.
In Proceedings of the IFIP Working Conference on Programming Concepts and
Methods (PROCOMET), 1998.
- [68]
- David A. Cooper and
Kenneth P. Birman.
The design and implementation of a private message service for mobile
computers.
Wireless Networks, 1(3):297-309, 1995.
- [69]
- Joan Daemen and Vincent
Rijmen.
AES
proposal: Rijndael, September 1999.
- [70]
- Zhe Dang and Richard A.
Kemmerer.
Using the ASTRAL model checker for cryptographic protocol analysis.
In DIMACS Workshop on Design and Formal Verification of Security
Protocols, page 14 pages, September 3-5, 1997.
- [71]
- Bruno D'Ausbourg.
Implementing secure dependencies over a network by designing a distributed
security SubSystem.
In Dieter Gollmann, editor, 3rd European Symposium on Research in
Computer Security, ESORICS'94, LNCS 875, pages 249-266, November
7-9, 1994.
- [72]
- D. Davis and R. Swick.
Network security via
private-key certificates.
ACM Operating Systems Review, 24(4):64-67, October 1990.
- [73]
- D. Davis, D. Geer, and T. Y.
Ts'o.
Kerberos with clocks
adrift: History, protocols, and implementation.
USENIX Computing Systems, 9(1), 1996.
- [74]
- M. Debbabi, M. Mejri,
N. Tawbi, and I. Yahmadi.
A
new algorithm for the automatic verification of authentication protocols:
From specifications to flaws and attack scenarios.
In DIMACS Workshop on Design and Formal Verification of Security
Protocols, page 19 pages, September 3-5, 1997.
- [75]
- Grit Denker and Jonathan
Millen.
CAPSL and CIL
language design.
Technical Report SRI-CSL-99-02, SRI International, Computer Science Lab, Menlo
Park, CA, USA, February 1999.
- [76]
- T. Dierks and C. Allen.
The TLS protocol, version
1.0, January 1999.
RFC 2246.
- [77]
- W. Diffie and M. Hellman.
New directions in cryptography.
IEEE Transactions on Information Theory, 22(6):644-654, 1976.
- [78]
- Hans Dobbertin, Antoon
Bosselaers, and Bart Preneel.
RIPEMD-160: A strengthened version of RIPEMD.
In Proceedings of Fast Software Encryption (FSE'96), LNCS 1039,
pages 71-82. Springer Verlag, 1996.
- [79]
- D. Dolev and A. C. Yao.
On the security of public key protocols.
In Proceedings of the 22th IEEE Symposium on Foundations of Computer
Science, pages 350-357, 1981.
- [80]
- Danny Dolev, Cynthia Dwork,
Orli Waarts, and Moti Yung.
Perfectly secure message transmission.
Journal of the ACM, 40(1):17-47, January 1993.
- [81]
- Josep Domingo-Ferrer.
Distributed user identification by zero-knowledge access rights proving.
Information Processing Letters, 40(5):235-239, December 1991.
- [82]
- William A. Doster and Jim
Rees.
Third-party authentication in the institutional file system.
Technical Report CITI TR 92-1, University of Michigan, Ann Arbor, MI, USA,
February 1992.
- [83]
- A. Durante, R. Focardi, and
R. Gorrieri.
CVS: A
compiler for the analysis of cryptographic protocols.
In Proceedings of the 12th IEEE Computer Security Foundations
Workshop, pages 203-212, June 1999.
- [84]
- Bruno Dutertre and
Steve Schneider.
Using a PVS
embedding of CSP to verify authentication protocols.
In Proceedings of the 10th IEEE Computer Security Foundation
Workshop, pages 3-17, 1997.
- [85]
- Cynthia Dwork and Moni Naor.
Pricing
via processing or combatting junk mail.
In Proceedings of Crypto'92, 1992.
- [86]
- Martin Dyer, Trevor Fenner, Alan
Frieze, and Andrew Thomason.
On key storage in secure networks.
Journal Of Cryptology, 8:189-200, 1995.
- [87]
- Joan Dyer, Ron Perez, Sean W.
Smith, and Mark Lindemann.
Application support architecture for a high-performance, programmable secure
coprocessor.
In 22nd National Information Systems Security Conference, October
1999.
- [88]
- Joan G. Dyer, Mark Lindemann,
Ronald Perez, Reiner Sailer, Leendert van Doorn, Sean W. Smith, and Steve
Weingart.
Building the IBM 4758 secure coprocessor.
IEEE Computer, 34(10):57-65, October 2001.
- [89]
- Claudia Eckert.
Tool-supported verification of cryptographic protocols.
In IFIP 1998, 1998.
- [90]
- Erin English and Scott
Hamilton.
Network security under siege: The timing attack.
Computer, 29(3):95-97, March 1996.
- [91]
- Pasi Eronen.
Denial
of service in public key protocols.
In Paper presented in Helsinki University of Technology's Seminar on
Network Security course (Fall 2000), December 2000.
- [92]
- R. Falk and M. Trommer.
Integrated management of network and host based security mechanisms.
In Colin Boyd and Ed Dawson, editors, 3rd Australasian Conference,
ACISP'98, LNCS 1438, pages 36--??, July 13-15, 1998.
- [93]
- Jean-Claude Fernandez,
Hubert Garavel, Alain Kerbrat, Radu Mateescu, Laurent Mounier, and Mihaela
Sighireanu.
CADP: A protocol validation and verification toolbox.
In Rajeev Alur and Thomas A. Henzinger, editors, Proceedings of the 8th
Conference on Computer-Aided Verification, LNCS 1102, pages 437-440,
1996.
- [94]
- J.F. Fhem, D. Veithen, and J.J.
Quisquater.
SCALPS: Smart
card applied to little payment systems.
IEEE Micro, 16(3):42-51, June 1996.
- [95]
- FIPS.
Security requirements for cryptographic modules, FIPS PUB 140-2, 1999.
- [96]
- FIPS.
Digital Signature Standard (DSS), FIPS PUB 186-2, January 27, 2000.
- [97]
- FIPS.
Advanced Encryption Standard, FIPS PUB 197, November 2001.
- [98]
- FIPS.
The
Keyed-hash Message Authentication Code (HMAC), FIPS PUB 198,
March 6, 2002.
- [99]
- FIPS.
Secure Hash Standard, FIPS PUB 180-2, August 1, 2002.
- [100]
- R. Focardi and
R. Gorrieri.
Automatic compositional verification of some security properties.
In Tiziana Margaria and Berhard Steffen, editors, Tools and Algorithms
for the Construction and Analysis of Systems, 2nd International Workshop
TACAS'96, LNCS 1055, pages 167-186. Springer Verlag, March 27-29,
1996.
- [101]
- Warwick Ford.
Standardizing information technology security.
StandardView, 2(2):64-71, 1994.
- [102]
- Armando Fox and Steven D.
Gribble.
Security on the move: Indirect authentication using Kerberos.
In Proceedings of the 2nd Annual International Conference on Mobile
Computing and Networking, pages 155-164, November 1996.
- [103]
- Yair Frankel, Amir Herzberg,
Paul A. Karger, Hugo Krawczyk, Charles A. Kunzinger, and Moti Yung.
Security issues in a CDPD wireless network.
IEEE Personal Communications, pages 16-27, August 1995.
- [104]
- Walter Fumy.
(local area) network security.
In Bart Preneel, René Govaerts, and Joos Vandewalle, editors,
Computer Security and Industrial Cryptography, ESAT Course'91,
LNCS 741, pages 211-226, May 21-23, 1991.
- [105]
- Klaus Gaarder and Einar
Snekkenes.
Applying a formal analysis technique to the CCITT X.509 strong two-way
authentication protocol.
Journal Of Cryptology, 3:81-98, 1991.
- [106]
- J. Galvin and
K. McCloghrie.
RFC 1446: Security protocols
for version 2 of the Simple Network Management Protocol (SNMPv2),
April 1993.
Status: HISTORIC.
- [107]
- Taher El Gamal.
A public key cryptosystem and a signature scheme based on discrete logarithms.
In Advances in Cryptology: Proceedings of CRYPTO 1984, LNCS 0196,
pages 10-18, 1985.
- [108]
- Hubert Garavel.
An overview of the Eucalyptus toolbox.
In Proceedings of COST247 International Workshop on Applied Formal
Methods in System Design, pages 76-88, June 1996.
- [109]
- Lee Garber.
Denial-of-service attacks rip the Internet.
IEEE Computer, 33(4):12-17, April 2000.
- [110]
- Morrie Gasser.
Access control and authentication in LANs.
In Thomas A. Berson and Thomas Beth, editors, Proceedings of the Workshop
on Local Area Network Security (LANSEC'89), LNCS 396, pages 19-30,
Berlin, April 1989. Springer.
- [111]
- Edgardo Gerck.
Overview of certification systems:
X.509, CA, PGP and SKIP, July 2000.
A previous version has been published at the '99 Black Hat Conference in Las
Vegas, NV, USA.
- [112]
- F. Germeau and G. Leduc.
A computer aided design of a secure registration protocol.
In Proceedings of Formal Description Techniques (X) / Protocol
Specification, Testing and Verification (XVII), FORTE/PSTV'97, Osaka,
Japan, November 1997.
- [113]
- F. Germeau and G. Leduc.
Model-based design and verification of security protocols using LOTOS.
In Proceedings of the DIMACS Workshop on Design and Formal Verification
of Security Protocols, Rutgers University, September 1997.
- [114]
- Thomer Michael Gil.
MULTOPS: A data
structure for denial-of-service attack detection.
Master's thesis, Division of Mathematics and Computer Science, Vrije
Universiteit, Netherlands, December 2000.
- [115]
- C. Gray Girling.
Covert channels in LANs.
IEEE Transactions on Software Engineering, 13(2):292-296,
February 1987.
- [116]
- Frédéric Gittler
and Anne C. Hopkins.
The DCE security service.
Hewlett-Packard Journal: technical information from the laboratories
of Hewlett-Packard Company, 46(6):41-48, December 1995.
- [117]
- Jaeseung Go and Kwangjo Kim.
Wireless
authentication protocols preserving user anonymity.
In Symposium on Cryptography and Information Security (SCIS'01),
pages 159-164, January 23-26, 2001.
- [118]
- David Goldschlag, Michael
Reed, and Paul Syverson.
Onion Routing for anonymous and private Internet connections.
Communications of the ACM, 42(2):39-41, February 1999.
- [119]
- David M. Goldschlag.
Several secure store and forward devices.
In Proceedings of the 3rd ACM Conference on Computer and Communications
Security, CCS'96, pages 129-137, March 14-15, 1996.
- [120]
- Li Gong and Nachum Shacham.
Multicast security and its extension to a mobile environment.
Wireless Networks, 1(3):281-295, 1995.
- [121]
- Li Gong, Roger Needham, and
R. Yahalom.
Reasoning
about belief in cryptographic protocols.
In Proceedings of the IEEE Symposium on Research in Security and
Privacy, pages 234-248, May 1990.
- [122]
- Li Gong, Patrick Lincoln, and
John Rushby.
Byzantine agreement with authentication: Observations and applications in
tolerating hybrid and link faults.
In Proceedings Dependable Computing for Critical Applications-5,
pages 139-157, Champaign, IL, September 1995.
- [123]
- Li Gong.
Using one-way
functions for authentication.
ACM Computer Communication Review, 19(5):8-11, October 1989.
- [124]
- Li Gong.
A security
risk of depending on synchronized clocks.
ACM Operating Systems Review, 26(1):49-54, January 1992.
- [125]
- Li Gong.
New protocols for third-party-based authentication and secure broadcast.
In Proceedings of the 2nd ACM Conference on Computer and Communications
Security, pages 176-183, Fairfax, VA, USA, November 2-4, 1994.
- [126]
- Li Gong.
Efficient network authentication protocols: Lower bounds and optimal
implementations.
Distributed Computing, 9(3):131-145, 1995.
- [127]
- Goodman, Dancy, and
Chandrakasan.
An energy/security scalable encryption processor using an embedded variable
voltage DC/DC converter.
IEEE Journal of Solid-State Circuits, 33(11):1799-1809, November
1998.
- [128]
- James W. Gray and John D.
McLean.
Using temporal logic to specify and verify cryptographic protocols.
In Proceedings of the 8th IEEE Computer Security Foundation
Workshop, pages 108-116, 1995.
- [129]
- Stefanos Gritzalis
and Diomidis Spinellis.
Cryptographic protocols over open distributed systems: A
taxonomy of flaws and related protocol analysis tools.
In Peter Daniel, editor, 16th International Conference on Computer
Safety, Reliability and Security (SAFECOMP'97), pages 123-137, York,
UK, September 1997. European Workshop on Industrial Computer Systems: TC-7,
Springer Verlag.
- [130]
- S. Gritzalis, D. Spinellis,
and P. Georgiadis.
Security protocols over open networks and distributed
systems: Formal methods for their analysis, design and verification.
Computer Communications, 22(8):697-709, May 1999.
- [131]
- Carl A. Gunter and Trevor Jim.
Generalized
certificate revocation.
In ACM Symposium on Principles of Programming Languages, page (14
pages), January 2000.
- [132]
- Shai Halevi and Hugo
Krawczyk.
Public-key cryptography and password protocols.
In Proceedings of the 5th ACM Conference on Computer and Communications
Security, pages 122-131, San Francisco, CA, USA, November 2-5,
1998.
- [133]
- J. Daniel Halpern, Sam Owre,
Norman Proctor, and William F. Wilson.
Muse -- a computer assisted verification system.
IEEE Transactions on Software Engineering, 13(2):151-156,
February 1987.
- [134]
- Goichiro Hanaoka, Yuliang
Zheng, and Hideki Imai.
LITESET: A light-weight secure electronic transaction protocol.
In Colin Boyd and Ed Dawson, editors, 3rd Australasian Conference,
ACISP'98, LNCS 1438, pages ??--??, July 13-15, 1998.
- [135]
- Dan Harkins and Dave
Carrel.
The
Internet Key Exchange (IKE), May 1999.
INTERNET DRAFT
(http://www.ietf.org/internet-drafts/draft-ietf-ipsec-ike-01.txt).
- [136]
- Jingmin He and Ed Dawson.
Shared secret reconstruction.
Designs, Codes and Cryptography, 14(3):221-237, September
1998.
- [137]
- Nevin Heintze and J. Doug
Tygar.
Timed models for protocol security.
Technical Report CMU-CS-92-100, Carnegie Mellon University, January 1992.
- [138]
- Nevin Heintze and J. Tygar.
A
model for secure protocols and their compositions.
IEEE Transactions on Software Engineering, 22(1):16-30, January
1996.
- [139]
- Günther Horn and Bart
Preneel.
Authentication and payment in future mobile systems.
In European Symposium on Research in Computer Security
(ESORICS'98), LNCS 1485, pages 277-293, 1998.
- [140]
- R. Housley, W. Polk,
W. Ford, and D. Solo.
RFC 3280: Internet X.509
public key infrastructure certificate and certificate revocation list (CRL)
profile, April 2002.
http://www.ietf.org/rfc/rfc3280.txt.
- [141]
- Russell Housley.
Encapsulation security protocol design for local area networks.
In Thomas A. Berson and Thomas Beth, editors, Proceedings of the Workshop
on Local Area Network Security (LANSEC'89), LNCS 396, pages 103-112,
Berlin, April 1989. Springer.
- [142]
- Tzonelih Hwang and Yung-Hsiang
Chen.
On the security of SPLICE slash AS -- the authentication system in WIDE
Internet.
Information Processing Letters, 53(2):97-101, January 1995.
- [143]
- Tzonelih Hwang, Narn-Yih Lee,
Chuan-Ming Li, Ming-Yung Ko, and Yung-Hsiang Chen.
Two attacks on Neuman-Stubblebine authentication protocols.
Information Processing Letters, 53(2):103-107, January 1995.
- [144]
- ISO/IEC.
ITU-T Recommendation X.509, ISO/IEC 9594-8: Information technology --
open systems interconnection -- the directory: Public key and attribute
certificate frameworks, May 2001.
http://www-t.zhwin.ch/it/ksy/Block08/ITU/X509_4thEditionDraftV8.pdf.
- [145]
- Naomaru Itoi and Peter
Honeyman.
Pluggable authentication module for Windows NT.
Technical Report CITI TR 98-1, University of Michigan, Ann Arbor, MI, USA,
August 1998.
- [146]
- Wen-Ai Jackson, Keith M.
Martin, and Christine M. O'Keefe.
Mutually trusted authority-free secret sharing schemes.
Journal Of Cryptology, 10:261-289, 1997.
- [147]
- Philippe A. Janson, Gene
Tsudik, and Moti Yung.
Scalability and flexibility in authentication services: The KryptoKnight
approach.
In Proceedings of IEEE INFOCOM'97, pages 725-736, April 1997.
- [148]
- Robert Jerdonek, Peter
Honeyman, Kevin W. Coffman, Jim Rees, and Kip Wheeler.
Implementation of a provably secure, Smartcard-based key distribution
protocol.
Technical Report CITI TR 98-4, University of Michigan, Ann Arbor, MI, USA,
April 1998.
- [149]
- Audun Jøsang.
A subjective metric of authentication.
In Jean-Jacques Quisquater, Yves Deswarte, Catherine Meadows, and Dieter
Gollmann, editors, 5rd European Symposium on Research in Computer
Security, ESORICS'98, LNCS 1485, pages 329-344, September 16-18,
1998.
- [150]
- Ari Juels and John
Brainard.
Client puzzles: A cryptographic countermeasure against connection
depletion attacks.
In Proceedings of the 1999 Network and Distributed System Security
Symposium (NDSS'99), 1999.
- [151]
- Günter Karjoth.
Authorization in CORBA security.
In Jean-Jacques Quisquater, Yves Deswarte, Catherine Meadows, and Dieter
Gollmann, editors, 5rd European Symposium on Research in Computer
Security, ESORICS'98, LNCS 1485, pages 143-158, September 16-18,
1998.
- [152]
- R. A. Kemmerer, Catherine A.
Meadows, and J. Millan.
Three systems for cryptographic protocol analysis.
Journal of Cryptology, 7(2):79-130, 1994.
- [153]
- S. Kent.
RFC 1422:
Privacy enhancement for Internet electronic mail: Part II:
Certificate-based key management, February 1993.
- [154]
- Angelos D. Keromytis and
Jonathan M. Smith.
Creating
efficient fail-stop cryptographic protocols.
Technical Report MS-CIS-96-32, University of Pennsylvania, December 1996.
- [155]
- Volker Kessler and Heike
Neumann.
A sound logic for analysing electronic commerce protocols.
In Jean-Jacques Quisquater, Yves Deswarte, Catherine Meadows, and Dieter
Gollmann, editors, 5rd European Symposium on Research in Computer
Security, ESORICS'98, LNCS 1485, pages 345-360, September 16-18,
1998.
- [156]
- Kim Potter Kihlstrom,
Louise E. Moser, and P. M. Melliar-Smith.
The SecureRing
protocols for securing group communication.
In Proceedings of the 31st Annual Hawaii International Conference on
System Sciences (HICSS), volume 3, pages 317-326. IEEE Computer
Society Press, January 1998.
- [157]
- Darrell Kindred and
Jeannette M. Wing.
Fast, automatic checking of security protocols.
In 2nd USENIX Workshop on Electronic Commerce, pages 41-52,
November 1996.
- [158]
- Darrell Kindred and
Jeannette M. Wing.
Theory generation for security protocols.
TOPLAS, 7, 1999.
- [159]
- Kimberly E. Kirkpatrick.
Modeling a LAN security server.
In Thomas A. Berson and Thomas Beth, editors, Proceedings of the Workshop
on Local Area Network Security (LANSEC'89), LNCS 396, pages 113-138,
Berlin, April 1989. Springer.
- [160]
- J. Kohl and C. Neuman.
RFC 1510: The Kerberos
Network Authentication Service (V5), September 1993.
Status: PROPOSED STANDARD.
- [161]
- Jiejun Kong, Haiyun Luo, Kaixin
Xu, Daniel Lihui Gu, Mario Gerla, and Songwu Lu.
Adaptive security for multi-layer ad-hoc networks.
Wireless Communications and Mobile Computing, August 2002.
(to be published).
- [162]
- Tanya Korelsky, Bill Dean,
Carl Eichenlaub, James Hook, Carl Klapper, Marcos Lam, Daryl McCullough,
Garrel Pottinger, Owen Rambow, David Rosenthal, Jonathan P. Seldin, and D. G.
Weber.
Security modeling in the Ulysses environment.
In Proceedings of the 4th Annual Computer Security Applications
Conference, 1988.
- [163]
- Joseph M. Kusmiss.
Reassurance for the electronically insecure: Review of Network and
Internetwork Security: Principles and Practices.
IEEE Software, 12(3):103, May 1995.
- [164]
- RSA Laboratories.
Answers to Frequently Asked Questions About Today's
Cryptography.
RSA Security Inc., version 4.1 edition, May 2000.
- [165]
- Xuejia Lai and James L.
Massey.
A proposal for a new block encryption standard.
In Advances in Cryptology - Eurocrypt'90, pages 389-404.
Springer-Verlag, 1991.
- [166]
- Xuejia Lai, James L. Massey, and
Sean Murphy.
Markov ciphers and differential cryptanalysis.
In Advances in Cryptology - Eurocrypt'91, LNCS 547, pages 17-38.
Springer-Verlag, 1991.
- [167]
- Paul A. Lambert.
Architectural considerations for LAN security protocols.
In Thomas A. Berson and Thomas Beth, editors, Proceedings of the Workshop
on Local Area Network Security (LANSEC'89), LNCS 396, pages 5-12,
Berlin, April 1989. Springer.
- [168]
- Butler W. Lampson, Martín
Abadi, Michael Burrows, and Edward Wobber.
Authentication in distributed systems: Theory and practice.
ACM Transactions on Computer Systems, 10(4):265-310, November
1992.
- [169]
- Butler W. Lampson.
Technology to achieve secure computer systems.
In Computers at Risk, pages 74-101. National Academy Press,
1991.
- [170]
- Guy Leduc, O. Bonaventure,
E. Koerner, Luc Léonard, C. Pecheur, and D. Zanetti.
Specification and verification of a TTP protocol for the conditional access
to services.
In Proceedings of 12th J. Cartier Workshop on Formal Methods and their
Applications: Telecommunications, VLSI and Real-Time Computerized Control
System, October 2-4, 1996.
- [171]
- G. Leduc.
Verification of two versions of the Challenge Handshake Authentication
Protocol (CHAP).
Annals of Telecommunications, 1999.
(to appear).
- [172]
- Jussipekka Leiwo, Tuomas Aura,
and Pekka Nikander.
Towards network denial of service resistant protocols.
In Proceedings of the 15th International Information Security Conference
(IFIP/SEC 2000), pages 301-310, August 2000.
- [173]
- K. H. Leung, K. W. Ma, W. K.
Wong, and P. H. W. Leong.
FPGA
implementation of a microcoded elliptic curve cryptographic processor.
In Proceedings of Field-Programmable Custom Computing Machines
(FCCM'00), pages 68-76, 2000.
- [174]
- Randall W. Lichota, Grace L.
Hammonds, and Stephen H. Brackin.
Verifying the correctness
of cryptographic protocols using "Convince".
In Proceedings of the 12th Annual Computer Security Applications
Conference, page 12 pages, December 1996.
- [175]
- Armin Liebl.
Authentication in distributed systems: A bibliography.
ACM Operating Systems Review, 27(4):31-41, 1993.
- [176]
- Chae Hoon Lim and Pil Joong Lee.
Several practical protocols for authentication and key exchange.
Information Processing Letters, 53(2):91-96, January 1995.
- [177]
- Hung-Yu Lin and Lein Harn.
Authentication protocols for personal communication systems.
In Proceedings of the Conference on Applications, Technologies,
Architectures, and Protocols for Computer Communication, pages
256-261, August 1995.
- [178]
- J. Linn.
Generic
security service application program interface, version 2, January 1997.
RFC 2078 (http://aurora.rg.iupui.edu/doc/rfc/rfc-html/rfc2078.html).
- [179]
- T. Mark A. Lomas, Li Gong,
Jerome H. Saltzer, and Roger M. Needham.
Reducing
risks from poorly chosen keys.
In Proceedings of the 12th ACM Symposium on Operating Systems
Principles, pages 14-18, December 1989.
- [180]
- Gavin Lowe.
Breaking and fixing the Needham-Schroeder public-key protocol using FDR.
In Tiziana Margaria and Berhard Steffen, editors, Tools and Algorithms
for the Construction and Analysis of Systems, 2nd International Workshop
TACAS'96, LNCS 1055, pages 147-166. Springer Verlag, March 27-29,
1996.
- [181]
- Gavin Lowe.
A hierarchy of authentication specification.
In Proceedings of the 1997 IEEE Computer Society Symposium on Research in
Security and Privacy, pages 31-43, 1997.
- [182]
- Gavin Lowe.
Casper:
A compiler for the analysis of security protocols.
http://www.mcs.le.ac.uk/~glowe/Security/Casper/casper.ps, July 6, 1998.
- [183]
- Dahlia Malkhi and Michael
Reiter.
Byzantine
quorum systems.
Distributed Computing, 11(4):203-213, 1998.
- [184]
- Dahlia Malkhi, Elan Pavlov,
and Yaron Sella.
Optimal unconditional information diffusion.
In DISC'01, 2001.
- [185]
- Dahlia Malkhi.
Quorum
systems, 1999.
Chapter in The Encyclopedia of Distributed Computing, Joseph Urban and Partha
Dasgupta (eds.), Kluwer Academic Publishers.
- [186]
- Will Marrero, Edmund Clarke,
and Somesh Jha.
A
model checker for authentication protocols.
In DIMACS Workshop on Design and Formal Verification of Security
Protocols, page 19 pages, September 3-5, 1997.
- [187]
- Anish Mathuria, Reihaneh
Safavi-Naini, and Peter Nickolas.
Some
remarks on the logic of Gong, Needham and Yahalom.
In Proceedings of the International Computer Symposium 1994,
volume 1, pages 303-308, December 12-14, 1994.
- [188]
- Kanta Matsuura and Hideki
Imai.
Protection of authenticated key-agreement protocol against a denial-of-service
attack.
In Proceedings of International Symposium on Information Theory and Its
Applications (ISITA'98), pages 466-470, October 1998.
- [189]
- Kanta Matsuura and Hideki
Imai.
Modification of Internet Key Exchange resistant against
denial-of-service.
In Pre-Proc. of Internet Workshop 2000 (IWS2000), pages 167-174,
February 2000.
- [190]
- Sjouke Mauw.
The
formalization of Message Sequence Charts.
- [191]
- Sjouke Mauw.
Message Sequence
Charts (MSC).
- [192]
- Patrick McDaniel, Peter
Honeyman, and Atul Prakash.
Lightweight secure group communication.
Technical Report CITI TR 98-2, University of Michigan, Ann Arbor, MI, USA,
April 1998.
- [193]
- Patrick D. McDaniel, Atul
Prakash, and Peter Honeyman.
Antigone: A flexible framework for secure group communication.
Technical Report CITI TR 99-2, University of Michigan, Ann Arbor, MI, USA,
September 1999.
- [194]
- Catherine Meadows and
David Mutchler.
Matching secrets in the absence of a continuously available trusted authority.
IEEE Transactions on Software Engineering, 13(2):289-292,
February 1987.
- [195]
- Catherine Meadows and
Paliath Narendran.
A
unification algorithm for the group diffie-hellman protocol,
January14-15, 2002.
- [196]
- Catherine A. Meadows.
Applying formal methods to the analysis of a key management protocol.
Journal of Computer Security, 1(1):5-36, 1992.
- [197]
- Catherine A. Meadows.
Formal verification of cryptographic protocols: A survey.
In Josef Pieprzyk and Reihanah Safavi-Naini, editors, Advances in
Cryptology - ASIACRYPT'94, LNCS 917, pages 133-150. Springer Verlag,
November 27-29, 1994.
- [198]
- Catherine A. Meadows.
The NRL protocol analyzer: An overview.
Journal of Logic Programming, 19/20:19 pages, 1994.
- [199]
- Catherine A. Meadows.
Analyzing the Needham-Schroeder public key protocol: A comparison of two
approaches.
In Elisa Bertino, Helmut Kurth, Giancarlo Martella, and Emilio Montolivo,
editors, 4rd European Symposium on Research in Computer Security,
ESORICS'96, LNCS 1146, pages 351-364, September 25-27, 1996.
- [200]
- Catherine A. Meadows.
The NRL protocol analyzer: An overview.
Journal of Logic Programming, 26(2):113-131, 1996.
- [201]
- Catherine A. Meadows.
Analysis of the Internet Key Exchange protocol using the NRL protocol
analyzer.
In Proceedings of the 1999 IEEE Symposium on Security and Privacy,
May 1999.
- [202]
- Catherine A. Meadows.
A formal framework and evaluation method for network denial of
service.
In Proceedings of the 12th IEEE Computer Security Foundation
Workshop, June 1999.
- [203]
- Catherine Meadows.
Open issues in formal methods for cryptographic protocol analysis.
In Proceedings of DISCEX 2000, pages 237-250, January 2000.
- [204]
- Catherine Meadows.
A cost-based framework for analysis of denial of service in networks.
Journal of Computer Security, 9(1-2):143-164, 2001.
- [205]
- Ralph C. Merkle.
Secure communications over insecure channels.
Communications of the Association for Computing Machinery,
21(4):294-299, April 1978.
- [206]
- Markus Michels, Markus
Stadler, and Hung-Min Sun.
On the security of some variants of the RSA signature scheme.
In Jean-Jacques Quisquater, Yves Deswarte, Catherine Meadows, and Dieter
Gollmann, editors, 5rd European Symposium on Research in Computer
Security, ESORICS'98, LNCS 1485, pages 85-96, September 16-18,
1998.
- [207]
- Jonathan K. Millen, Sidney C.
Clark, and Sheryl B. Freedman.
The Interrogator: Protocol security analysis.
IEEE Transactions on Software Engineering, 13(2):274-288,
February 1987.
- [208]
- S. P. Miller, B. C. Neuman, J. I.
Schiller, and J. H. Saltzer.
Kerberos authentication and authorization system.
Project Athena Technical Plan, Section E.2.1.
- [209]
- S. P. Miller, J. I. Neumann,
J. I. Schiller, and J. H. Saltzer.
Kerberos
authentication and authorisation system.
Technical Report Project Athena Technical Plan, Sec. E.2.1, MIT, 1989.
- [210]
- David L. Mills.
NTP
timescale and leap seconds.
http://www.eecis.udel.edu/~ntp/ntp_spool/html/leap.htm.
- [211]
- John C. Mitchell, Mark
Mitchell, and Ulrich Stern.
Automated
analysis of cryptographic protocols using Mur phi .
In Proceedings of the 1997 IEEE Symposium on Security and Privacy,
pages 141-151, May 1997.
- [212]
- John C. Mitchell, Vitaly
Shmatikov, and Ulrich Stern.
Finite-state analysis of SSL 3.0 and related protocols.
In Proceedings of the DIMACS Workshop on Design and Formal Verification
of Security Protocols, Rutgers University, September 1997.
- [213]
- Roger Needham and M. D.
Schroeder.
Authentication revisited.
ACM Operating Systems Review, 21(1):7, January 1987.
- [214]
- Roger M. Needham.
Denial of service: An example.
Communications of the ACM, 37(11):42-46, November 1994.
- [215]
- B. Clifford Neuman and
Stuart G. Stubblebine.
A note on the use of timestamps as nonces.
ACM Operating Systems Review, 27(2):10-14, April 1993.
- [216]
- Clifford Neuman, John Kohl,
and Theodore T'so.
The
Kerberos network authentication service (V5), March 10, 2000.
INTERNET-DRAFT, Expires September 10, 2000.
- [217]
- B. Clifford Neuman.
Protection and security issues for future systems.
In Arthur Karshmer and J. Nehmer, editors, Workshop on Operating Systems
of the 90s and Beyond, LNCS 563, pages 184-201. Springer Verlag, July
8-12, 1991.
- [218]
- Peter G. Neumann.
Inside risks: Denial-of-service attacks.
Communications of the ACM, 43(4):136, 2000.
- [219]
- Algirdas
Pak v stas and Sonata Pak v stiene.
Standards: NSK: A Norwegian cryptochip for supersafe communications.
Computer, 29(2):78-79, February 1996.
- [220]
- Se Hyun Park, Aura Ganz, and Zvi
Ganz.
Security protocol for IEEE 802.11 wireless local area network.
Mobile Networks and Applications, 3(3):237-246, 1998.
- [221]
- DongGook Park, JungJoon Kim,
Colin Boyd, and Ed Dawson.
Cryptographic salt: A countermeasure against denial-of-service attacks.
In 6th Australasian Conference on Information Security and Privacy
(ACISP'01), LNCS 2119, pages 344-343, July11-13, 2001.
- [222]
- Jaegwan Park, Jaeseung Go, and
Kwangjo Kim.
Wireless
authentication protocol preserving user anonymity.
In 4th International Symposium on Wireless Personal Multimedia
Communications (WPMC'01), pages 1153-1158, September 9-12, 2001.
- [223]
- Lawrence C. Paulson.
Inductive analysis of the internet protocol TLS.
Technical Report 440, Computer Laboratory, University of Cambridge, England,
December 16, 1997.
- [224]
- Lawrence C. Paulson.
On
two formal analyses of the Yahalom protocol.
Technical Report 432, Computer Laboratory, Cambridge University, July 1997.
- [225]
- Lawrence C. Paulson.
The inductive approach to
verifying cryptographic protocols.
Journal of Computer Security, 6:85-128, 1998.
- [226]
- Cem Paya.
A framework for world
wide web client-authentication protocols.
Technical Report PCS-TR98-328, Dartmouth College, Computer Science, Hanover,
NH, USA, March 1998.
- [227]
- Adrian Perrig and
Dawn Xiaodong Song.
A first step
on automatic protocol generation.
In Proceedings of Network and Distributed System Security,
February 2000.
- [228]
- Adrian Perrig and
Dawn Xiaodong Song.
Looking for diamonds in the dessert --- extending automatic protocol generation
to three-party authentication and key distribution.
In Proc. of IEEE Computer Security Foundation Workshop, July
2000.
- [229]
- Y. Kim. A. Perrig and
G. Tsudik.
Simple and
fault-tolerant key agreement for dynamic collaborative groups.
In ACM CCS'2000, November 2000.
- [230]
- Y. Kim. A. Perrig and
G. Tsudik.
Communication-efficient group key agreement.
In IFIP-SEC 2001, June 2001.
- [231]
- Adrian Perrig, Robert
Szewczyk, Victor Wen, David Culler, and J. Doug Tygar.
SPINS: Security suite for sensor networks.
In Conference on Mobile Computing and Networking (MOBICOM'01),
July16-21, 2001.
- [232]
- David Powell, André
Adelsbach, and Christian Cachin.
MAFTIA (malicious- and accidental-fault tolerance for Internet
applications).
In International Conference on Dependable Systems and Networks
(DSN'01), pages D-32 -- D-35, July 1-4, 2001.
- [233]
- M. Reiter and A. Rubin.
Crowds:
Anonymity for web transactions.
In ACM TISSEC, June 1999.
- [234]
- Michael K. Reiter, Kenneth P.
Birman, and Li Gong.
Integrating security in a group oriented distributed system.
Technical Report TR92-1269, Cornell University, Computer Science, February
1992.
- [235]
- Michael K. Reiter.
A security architecture for fault-tolerant systems.
Master's thesis, Cornell University, Computer Science, July 1993.
available as Technical Report TR93-1367.
- [236]
- Michael K. Reiter.
Secure agreement protocols: Reliable and atomic group multicast in Rampart.
In Proceedings of the 2nd ACM Conference on Computer and Communications
Security, pages 68-80, November 2-4, 1994.
- [237]
- Michael K. Reiter.
A secure group membership protocol.
IEEE Transactions on Software Engineering, 22(1):31-42, January
1996.
- [238]
- Livio Ricciulli, Patrick
Lincoln, and Pankaj Kakkar.
TCP SYN flooding defense.
In Simulation Multiconference CNDS'99, January 17-20 1999.
- [239]
- Ronald L. Rivest and
Butler Lampson.
SDSI -- A simple distributed security infrastructure.
In Presented at CRYPTO'96 Rumpsession, 1996.
- [240]
- Ronald L. Rivest, A. Shamir,
and L. Adleman.
A method for obtaining digital signatures and public-key cryptosystems.
Communications of the ACM, 21(12):120-126, February 1978.
- [241]
- Ronald L. Rivest.
RFC 1321: The
MD5 message-digest algorithm, April 1992.
- [242]
- Ohad Rodeh, Ken Birman, Mark
Hayden, and Danny Dolev.
Dynamic virtual private networks.
Technical Report TR98-1695, Cornell University, Computer Science, August
1998.
- [243]
- A. W. Roscoe and M. H.
Goldsmith.
The perfect ``spy'' for model-checking cryptoprotocols.
In Proceedings of the DIMACS Workshop on Design and Formal Verification
of Security Protocols, Rutgers University, September 1997.
- [244]
- A. W. Roscoe.
Intensional specifications of security protocols.
In 9th IEEE Computer Security Foundation Workshop, pages 28-38,
1996.
- [245]
- A. Royo, J. Moron, and
J. López.
Design and implementation of a coprocessor for cryptography applications.
In Proceedings of European Design & Test Conference, 1997.
- [246]
- A. D. Rubin and Peter
Honeyman.
Formal methods for the analysis of authentication protocols.
Technical Report CITI TR 93-7, University of Michigan, Ann Arbor, MI, USA,
October 1993.
- [247]
- A. D. Rubin and Peter
Honeyman.
Long running jobs in an authenticated environment.
In Proceedings of the Fourth USENIX UNIX Security Symposium,
September 1993.
- [248]
- A. D. Rubin and Peter
Honeyman.
Long running jobs in an authenticated environment.
Technical Report CITI TR 93-1, University of Michigan, Ann Arbor, MI, USA,
March 1993.
(appeared in Proc. Fourth USENIX UNIX Security Symp.).
- [249]
- A. D. Rubin.
Nonmonotonic cryptographic protocols.
Technical Report CITI TR 93-9, University of Michigan, Ann Arbor, MI, USA,
November 1993.
(appeared in Proc. IEEE Comp. Security Foundations Workshop VII).
- [250]
- A. D. Rubin.
Nonmonotonic cryptographic protocols.
In Proceedings of the 7th IEEE Computer Security Foundation
Workshop, June 1994.
- [251]
- Ekkart Rudolph, Peter Graubmann, and
Jens Grabowski.
Tutorial
on Message Sequence Charts.
- [252]
- John Rushby.
Systematic formal verification
for fault-tolerant time-triggered algorithms.
IEEE Transactions on Software Engineering, 25(5):651-660,
September 1999.
- [253]
- Peter Ryan and Irfan
Zakiuddin.
Modelling and analysis of security protocols.
In DIMACS Workshop on Design and Formal Verification of Security
Protocols, page 22 pages, September 3-5, 1997.
- [254]
- Elton Saul and Andrew
Hutchison.
SPEAR II.
In South African Telecommunications, Networks and Applications Conference
(SATNAC'99), September 6-8, 1999.
- [255]
- E. Saul and A.C.M.
Hutchison.
An
environment to facilitate the teaching of GNY-based security protocol
analysis techniques.
In Proceedings of the Second World Conference in Information Security
Education, pages 285-305, July 2001.
- [256]
- E. Saul and A.C.M.
Hutchison.
Using GYPSIE, GYNGER and Visual GNY to analyze cryptographic
protocols in SPEAR II.
In Proceedings of the Eighth Annual Working Conference on Information
Security Management and Small Systems Security, September 2001.
- [257]
- Steve Schneider.
Verifying authentication protocols with CSP.
In 10th IEEE Computer Security Foundation Workshop, pages 3-17,
1997.
- [258]
- Bruce Schneier and John
Kelsey.
Remote auditing of software
outputs using a trusted coprocessor.
Future Generation Computer Systems, 13(1):9-18, 1997.
- [259]
- Bruce Schneier and Mudge.
Cryptanalysis of Microsoft's point-to-point tunneling protocol (PPTP).
In Proceedings of the 5th ACM Conference on Computer and Communications
Security, pages 132-141, San Francisco, CA, USA, November 2-5,
1998.
- [260]
- Bruce Schneier.
Applied Cryptography: Protocols, Algorithms, and Source Code in
C.
John Wiley & Sons, second edition, 1996.
- [261]
- Gisbert W. Selke.
Kryptographie: Verfahren, Ziele, Einsatzmöglichkeiten.
O'Reilly Verlag, 2000.
(german).
- [262]
- Peter Sewell and Jan Vitek.
Secure composition of insecure components.
In Proceedings of the 12th IEEE Computer Security Foundation
Workshop, June 1999.
- [263]
- Peter Sewell and Jan
Vitek.
Secure composition of insecure components.
Technical Report 463, Computer Laboratory, University of Cambridge, April
1999.
- [264]
- M. Shand and
J. Vuillemin.
Fast
implementations of RSA cryptography.
In Proceedings of the 11th IEEE Symposium on Computer Arithmetic,
pages 252-259, 1993.
- [265]
- Vitaly Shmatikov and
John C. Mitchell.
Analysis of a fair exchange protocol.
In Proceedings of the 1999 FLoC Workshop on Formal Methods and Security
Protocols, Trento, Italy, 1999.
- [266]
- Victor Shoup.
Practical threshold
signatures.
In Proc. Eurocrypt 2000, 1999.
- [267]
- P. Sinha, N. Venkitaraman,
T. Nandagopal, R. Sivakumar, and V. Bharghavan.
A wireless transmission control protocol for CDPD.
In IEEE Wireless Communications and Networking Conference,
September 1999.
- [268]
- P. Sinha, N. Venkitaraman,
R. Sivakumar, and V. Bharghavan.
WTCP: A reliable transport protocol for wireless wide-area networks.
In ACM Mobicom '99, August 1999.
- [269]
- Sean W. Smith and Steve
Weingart.
Building a high-performance, programmable secure coprocessor.
Computer Networks, 31:831-860, 1999.
- [270]
- Sean W. Smith, Ron Perez,
Steve H. Weingart, and Vernon Austel.
Validating a high-performance, programmable secure coprocessor.
In 22nd National Information Systems Security Conference, October
1999.
- [271]
- Dawn X. Song and Adrian
Perrig.
Advanced and authenticated marking schemes for IP traceback.
Technical Report UCB/CSD-00-1107, Computer Science Division (EECS), University
of California, Berkeley, USA, June 2000.
- [272]
- Dawn X. Song and Adrian
Perrig.
Advanced and
authenticated marking schemes for IP traceback.
In Proceedings IEEE Infocom 2001, April 22-26, 2001.
- [273]
- Dawn Xiaodong Song.
Athena:
An automatic checker for security protocol analysis.
In Proceedings of the 12th IEEE Computer Security Foundations
Workshop, June 1999.
- [274]
- M. Stangel and
V. Bharghavan.
Improving TCP performance in mobile computing environments.
In International Conference on Communications '98, June 1998.
- [275]
- Jennifer G. Steiner, Clifford
Neuman, and Jeffrey I. Schiller.
Kerberos:
An authentication service for open network systems.
In USENIX Association, editor, USENIX Conference Proceedings (Dallas,
TX, USA), pages 191-202, Berkeley, CA, USA, Winter 1988. USENIX
Association.
- [276]
- Michael Steiner, Gene Tsudik,
and Michael Waidner.
Diffie-Hellman key distribution extended to group communication.
In Proceedings of the 3rd ACM Conference on Computer and Communications
Security, CCS'96, pages 31-37, March 14-15, 1996.
- [277]
- Michael Steiner, Gene Tsudik,
and Michael Waidner.
CLIQUES: A
new approach to group key agreement.
In Proceedings of the ICDCS, May 1998.
- [278]
- Frank A. Stevenson.
Cryptanalysis of Contents Scrambling System, 1999.
- [279]
- Doug R. Stinson and
Tran van Trung.
Some new results on key distribution patterns and broadcast encryption.
Designs, Codes and Cryptography, 14(3):261-279, September
1998.
- [280]
- Stuart G. Stubblebine
and Rebecca N. Wright.
An authentication logic supporting synchronization, revocation, and recency.
In Proceedings of the 3rd ACM Conference on Computer and Communications
Security, CCS'96, pages 95-105, March 14-15, 1996.
- [281]
- Hung-Min Sun and Shiuh-Pyng
Shieh.
Cryptanalysis of private-key encryption schemes based on burst-error-correcting
codes.
In Proceedings of the 3rd ACM Conference on Computer and Communications
Security, CCS'96, pages 153-156, March 14-15, 1996.
- [282]
- P. Syverson and
Catherine Meadows.
A logical language for specifying cryptographic protocol
requirements.
In Proceedings of the 1993 IEEE Computer Society Symposium on Research in
Security and Privacy, pages 165-177, 1993.
- [283]
- P. Syverson and
Catherine Meadows.
Formal requirements for key distribution protocols.
In Advances in Cryptology - Eurocrypt'94, pages 320-331, 1995.
- [284]
- P. Syverson and
Catherine Meadows.
A formal language for cryptographic protocol requirements.
Designs, Codes, and Cryptography, 7(1/2):27-59, 1996.
- [285]
- P. Syverson and
P. van Oorschot.
On unifying some cryptographic protocol logics.
In Proceedings of the IEEE Computer Society Symposium on Research in
Security and Privacy, pages 14-28, 1994.
- [286]
- P. Syverson.
On key distribution protocols for repeated authentication.
ACM Operating Systems Review, 27(4):24-30, October 1993.
- [287]
- P. Syverson.
A taxonomy of replay attacks.
In Proceedings of the 7th IEEE Computer Security Foundations
Workshop, 1994.
- [288]
- P. Syverson.
Limitations on design principles for public key protocols.
In Proceedings of the IEEE Computer Society Symposium on Research in
Security and Privacy, pages 62-73, 1996.
- [289]
- Alexander Tiountchik
and Elena Trichina.
RSA
acceleration with field programmable gate arrays.
Lecture Notes in Computer Science, 1587:164-176, 1999.
- [290]
- Martin Tompa and Heather Woll.
How to share a secret with cheaters.
Journal Of Cryptology, 1:133-138, 1988.
- [291]
- Gene Tsudik.
Message authentication with one-way hash functions.
ACM SIGCOMM Computer Communication Review, 22(5):29-38, October
1992.
- [292]
- Marten van Dijk, Christian
Gehrmann, and Ben Smeets.
Unconditionally secure group authentication.
Designs, Codes and Cryptography, 14(3):281-296, September
1998.
- [293]
- Serge Vaudenay.
An experiment on DES statistical cryptanalysis.
In Proceedings of the 3rd ACM Conference on Computer and Communications
Security, CCS'96, pages 139-147, March 14-15, 1996.
- [294]
- Klaus Vedder.
Security aspects of mobile communications.
In Bart Preneel, René Govaerts, and Joos Vandewalle, editors,
Computer Security and Industrial Cryptography, ESAT Course'91,
LNCS 741, pages 193-210, May 21-23, 1991.
- [295]
- Jan Vitek, Manuel Serrano, and
Dimitris Thanos.
Security and communication in mobile object systems.
In Jan Vitek and Christian Tschudin, editors, Mobile Object Systems:
Towards the Programmable Internet (MOS'96), LNCS 1222, pages
177-200. Springer Verlag, April 1997.
- [296]
- Haining Wang, Danlu Zhang, and
Kang G. Shin.
Detecting SYN
flooding attacks.
In IEEE Infocom 2002, June 23-27, 2002.
- [297]
- Richard Ward.
OSI network security and the NTCB.
In Thomas A. Berson and Thomas Beth, editors, Proceedings of the Workshop
on Local Area Network Security (LANSEC'89), LNCS 396, pages 67-74,
Berlin, April 1989. Springer.
- [298]
- Gabriele Wedel and Volker
Kessler.
Formal semantics for authentication logics.
In Elisa Bertino, Helmut Kurth, Giancarlo Martella, and Emilio Montolivo,
editors, 4rd European Symposium on Research in Computer Security,
ESORICS'96, LNCS 1146, pages 219-240, September 25-27, 1996.
- [299]
- Michael J. Wiener.
Performance
comparison of public-key cryptosystems.
CryptoBytes Technical Newsletter, 4(1):1-5, Summer 1998.
ftp://ftp.rsasecurity.com/pub/cryptobytes/crypto4n1.pdf.
- [300]
- Steve R. Wilbur, Jon
Crowcroft, and Yuko Muroyama.
MAC layer security measures in local area networks.
In Thomas A. Berson and Thomas Beth, editors, Proceedings of the Workshop
on Local Area Network Security (LANSEC'89), LNCS 396, pages 53-66,
Berlin, April 1989. Springer.
- [301]
- Uwe G. Wilhelm, Sebastian
Staamann, and Levente Buttyán.
Introducing trusted third parties to the mobile agent paradigm.
In Jan Vitek and Christian Jensen, editors, Secure Internet Programming:
Security Issues for Mobile and Distributed Objects, LNCS 1603.
Springer Verlag, 1999.
- [302]
- Manfred Wolf.
Covert channels in LAN protocols.
In Thomas A. Berson and Thomas Beth, editors, Proceedings of the Workshop
on Local Area Network Security (LANSEC'89), LNCS 396, pages 91-102,
Berlin, April 1989. Springer.
- [303]
- Thomas Y. C. Woo and Simon S.
Lam.
Authentication for
distributed systems.
Computer, 25(1):39-52, January 1992.
- [304]
- Thomas Y. C. Woo and Simon S.
Lam.
A semantic model for
authentication protocols.
In Proceedings of the IEEE Computer Society Symposium on Research in
Security and Privacy, pages 178-194, 1993.
- [305]
- Thomas Y. C. Woo and Simon S.
Lam.
A lesson on authentication protocol design.
ACM Operating Systems Review, 28(3):24-37, July 1994.
- [306]
- Anthony A. Wood and
John A. Stankovic.
Denial of service in sensor networks.
IEEE Computer, 35(10):54-62, October 2002.
- [307]
- R. Yahalom, B. Klein, and
T. Beth.
Trust relations in secure systems
-- a distributed authentication perspective.
In Proceedings of the 1993 IEEE Computer Society Symposium on Security
and Privacy (SSP'93), pages 150-164, 1993.
- [308]
- Bennet S. Yee and J. Doug
Tygar.
Secure coprocessors
in electronic commerce applications.
In Proceedings 1995 USENIX Electronic Commerce Workshop, 1995.
- [309]
- Bennet S. Yee.
Using Secure
Coprocessors.
PhD thesis, Carnegie Mellon University, May 1994.
- [310]
- Yongguang Zhang and Wenke Lee.
Intrusion detection in wireless ad-hoc networks.
In Proceedings of the 6th Conference on Mobile Computing and
Networking, pages 275-283, August 6-11, 2000.
- [311]
- Lidong Zhou and Zygmunt J.
Haas.
Securing ad hoc networks.
IEEE Network, 13(6):24-30, 1999.
- [312]
- Lidong Zhou, Fred B. Schneider,
and Robbert van Renesse.
COCA: A secure distributed on-line certification authority.
Technical Report TR2000-1828, Computer Science Department, Cornell University,
December 2000.
- [313]
- Lidong Zhou.
Towards Fault-Tolerant and Secure On-Line Services.
PhD thesis, Department of Computer Science, Cornell University, Ithaca, NY USA,
May 2001.
- [314]
- Reto Zimmermann, Andreas
Curiger, Heinz Bonnenberg, Hubert Kaeslin, Norbert Felber, and Wolfgang
Fichtner.
A 177 Mbit/s VLSI implementation of the International Data
Encryption Algorithm.
IEEE Journal of Solid-State Circuits, 29(3):303-307, March
1994.
- [315]
- André Zúquete
and Paulo Guedes.
Transparent authentication and confidentiality for stream sockets -- ensuring
private network communications for Unix and Windows systems.
IEEE Micro, 16(3):34-41, June 1996.