315 references, last updated Fri Apr 11 16:37:14 2003

[1]
Martín Abadi and Andrew D. Gordon. A calculus for cryptographic protocols: the Spi Calculus. In Proceedings of the 4th ACM Conference on Computer and Communications Security, pages 129-137, Zurich, Switzerland, April 1-4, 1997.

[2]
Martín Abadi and Roger Needham. Prudent engineering practice for cryptographic protocols. IEEE Transactions on Software Engineering, 22(1):6-15, January 1996.

[3]
Martín Abadi and M. Tuttle. A semantics for a logic of authentication. In Proceedings of the 10th Annual ACM Symposium on Principles of Distributed Computing, pages 201-216, 1991.

[4]
Michel Abdalla and Matthew Franklin. Secure group communication over partially connected networks. In DISC'01, 2001.

[5]
William A. Adamson, Jim Rees, and Peter Honeyman. Joining security realms: A single login for NetWare and Kerberos. In Proceedings of the 2nd International Workshop on Services in Distributed and Networked Environments, pages 2-10, June 1995.

[6]
William A. Adamson, Jim Rees, and Peter Honeyman. Joining security realms: A single login for NetWare and Kerberos. Technical Report CITI TR 95-1, University of Michigan, Ann Arbor, MI, USA, February 1995. (appeared in Proc. 2nd Intl. Workshop on Services in Distributed and Networked Environments).

[7]
J.D. Tygar Alma Whitten. Usability of security: A case study. Technical Report CMU-CS-98-155, Computer Science Department, School of Computer Science, Carnegie Mellon University, December 1998.

[8]
Yair Amir, Giuseppe Ateniese, Damian Hasse, Yongdae Kim, Cristina Nita-Rotaru, Theo Schlossnagle, John Schultz, Jonathan Stanton, and Gene Tsudik. Secure group communication in asynchronous networks with failures: Integration and experiments. In International Conference on Distributed Computing Systems, 1999.

[9]
Yair Amir, Kim Yongdae, Cristina Nita-Rotaru, and Gene Tsudik. On the performance of group key agreement protocols. Technical Report CNDS-2001-5, Center for Networking and Distributed Systems, Johns Hopkins University, November 2001.

[10]
Ross Anderson and Markus Kuhn. Tamper resistance a cautionary note. In Proceedings of the Second Usenix Workshop on Electronic Commerce, pages 1-11, November 1996.

[11]
Ross Anderson and Markus Kuhn. Low cost attacks on tamper resistant devices. In Security Protocols, 5th International Workshop, LNCS 1361, pages 125-136, April 7-9, 1997.

[12]
R. Anderson, F. Bergadano, B. Crispo, J. Lee, C. Manifavas, and R. Needham. A new family of authentication protocols. Operating Systems Review, 32(4):9-20, October 1998.

[13]
Ross J. Anderson. Why cryptosystems fail. Communications of the ACM, 37(11):97-102, November 1994.

[14]
Tal Anker, Gregory V. Chockler, Danny Dolev, and Idit Keidar. Scalable group membership services for novel applications. In Marios Mavronicolas, Michael Merritt, and Nir Shavit, editors, Proceedings of the DIMACS Workshop on Networks in Distributed Computing, 1998.

[15]
Andrew W. Appel and Edward W. Felten. Proof-carrying authentication. In Proceedings of the 6th ACM Conference on Computer and Communications Security, pages 52-62, Singapore, November 1-4, 1999.

[16]
Giuseppe Ateniese, Michael Steiner, and Gene Tsudik. Authenticated group key agreement and friends. In Proceedings of the 5th ACM Conference on Computer and Communications Security, pages 17-26, November 1998.

[17]
Tuomas Aura, Pekka Nikander, and Jussipekka Leiwo. DOS-resistant authentication with client puzzles. In Proceedings of the 8th International Workshop on Security Protocols, LNCS 2133, pages 170-177, April 2000.

[18]
Ashar Aziz and Whitfield Diffie. Privacy and authentication for wireless local area networks. IEEE Personal Communications, First Quarter:25-31, 1994.

[19]
Ashar Aziz and Martin Patterson. Simple Key-management for Internet Protocols (SKIP). In Proceedings of INET'95, 1995.

[20]
Joonsang Baek, Kwangjo Kim, and Tsutomu Matsumoto. On the significance of unknown key-share attacks: How to cope with them?. In Symposium on Cryptography and Information Security (SCIS'00), January 26-28, 2000.

[21]
W. C. Barker, P. Cochrane, and M. Branstad. Embedding cryptography into a Trusted Mach system. In Fourth Aerospace Computer Security Applications Conference, pages 379-383, Silver Spring, MD, USA, December 12-16, 1988. IEEE Computer Society Press.

[22]
J. P. Bekmann and P. de Goede. Multi-dimensional security protocol engineering using SPEAR. Technical Report CS97-20-00, Department of Computer Science, University of Cape Town, South Africa, October 2, 1997.

[23]
J. P. Bekmann, P. de Goede, and Andrew Hutchison. SPEAR: A security protocol engineering and analysis resource. In DIMACS Workshop on Design and Formal Verification of Security Protocols, September 3-5, 1997.

[24]
Giampaolo Bella and Lawrence C. Paulson. Using Isabelle to prove properties of the Kerberos authentication system. In Proceedings of the DIMACS Workshop on Design and Formal Verification of Security Protocols, Rutgers University, September 1997.

[25]
Giampaolo Bella and Lawrence C. Paulson. Kerberos Version IV: Inductive analysis of the secrecy goals. In Jean-Jacques Quisquater, Yves Deswarte, Catherine Meadows, and Dieter Gollmann, editors, 5rd European Symposium on Research in Computer Security, ESORICS'98, LNCS 1485, pages 361-375, September 16-18, 1998.

[26]
Mihir Bellare and Phillip Rogaway. Provable secure session key distribution: the three party case. In Proceedings of the 27th Annual ACM Symposium on Theory of Computing, pages 57-66, Las Vegas, NV, USA, May 29-1, 1995.

[27]
Steve Bellovin and Michael Merritt. Limitations of the Kerberos authentication system. In USENIX Winter Conference, 1991.

[28]
Daniel M. Berry. Towards a formal basis for the formal development method and the Ina Jo specification language. IEEE Transactions on Software Engineering, 13(2):184-200, February 1987.

[29]
Elisa Bertino, Francesco Buccafurri, Elena Ferrari, and Pasquale Rullo. An authorization model and its formal semantics. In Jean-Jacques Quisquater, Yves Deswarte, Catherine Meadows, and Dieter Gollmann, editors, 5rd European Symposium on Research in Computer Security, ESORICS'98, LNCS 1485, pages 127-142, September 16-18, 1998.

[30]
V. Bharghavan and C. V. Ramamoorthy. Security issues in mobile communications. In International Symposium on Autonomous Decentralized Systems'95, April 1995.

[31]
V. Bharghavan. Secure wireless LANs. In Proceedings of the 2nd ACM Conference on Computer and communications security, pages 10-17, November 1994.

[32]
V. Bharghavan. Performance analysis of a medium access protocol for wireless packet networks. In IEEE Performance and Dependability Symposium '98, August 1998.

[33]
Ray Bird, Inder Gopal, Amir Herzberg, Phil Janson, Shay Kutten, Refik Molva, and Moti Yung. Systematic design of a family of attack resistant protocols. IEEE Journal on Selected Areas in Communications, 11(5):679-693, June 1993.

[34]
Ray Bird, Inder Gopal, Amir Herzberg, Phil Janson, Shay Kutten, Refik Molva, and Moti Yung. The KryptoKnight family of light-weight protocols for authentication and key distribution. IEEE/ACM Transactions on Networking, 3(1):31-41, February 1995.

[35]
Simon Blake-Wilson and Alfred Menezes. Authenticated Diffie-Hellman key agreement protocols. In Proceedings of the 5th Annual Workshop on Selected Areas in Cryptography (SAC'98), LNCS 1556, pages 339-361, 1999.

[36]
Chiara Bodei, Pierpaolo Degano, Flemming Nielson, and Hanne Riis Nielson. Security analysis using flow logics. Bulletin of the European Association for Theoretical Computer Science EATCS, pages 112-129, February 2000.

[37]
Dominique Bolignano. An approach to the formal verification of cryptographic protocols. In Proceedings of the 3rd ACM Conference on Computer and Communications Security, CCS'96, pages 106-118, March 14-15, 1996.

[38]
Dominique Bolignano. Towards a mechanization of cryptographic protocol verification. In Orna Grumberg, editor, Proceedings of CAV'97, LNCS 1254, pages 131-142. Springer Verlag, June 22-25, 1997.

[39]
T. Bolognesi and E. Brinksma. Introduction to the ISO specification language LOTOS. Computer Networks and ISDN Systems, 14(1):25-59, 1987.

[40]
Mike Bond and Ross Anderson. API-level attacks on embedded systems. IEEE Computer, October 2001.

[41]
Dan Boneh and Hovav Shacham. Fast variants of RSA. CryptoBytes Technical Newsletter, 5(1):1-9, Winter/Spring 2002.

[42]
Nikita Borisov, Ian Goldberg, and David Wagner. Intercepting mobile communications: The insecurity of 802.11. In Conference on Mobile Computing and Networking (MOBICOM'01), July16-21, 2001.

[43]
Antoon Bosselaers, René Govaerts, and Joos Vandewalle. Fast hashing on the Pentium. In Advances in Cryptology, Proceedings Crypto'96, LNCS 1109, pages 298-312. Springer Verlag, 1996.

[44]
Colin Boyd and Wenbo Mao. Designing secure key exchange protocols. In Dieter Gollmann, editor, 3rd European Symposium on Research in Computer Security, ESORICS'94, LNCS 875, pages 93-105, November 7-9, 1994.

[45]
Colin Boyd and Anish Mathuria. Key establishment protocols for secure mobile communications: A selective survey. In Colin Boyd and Ed Dawson, editors, 3rd Australasian Conference, ACISP'98, LNCS 1438, pages ??--??, July 13-15, 1998.

[46]
Colin Boyd. A class of flexible and efficient key management protocols. In Proceedings of 9th IEEE Computer Security Foundations Workshop, pages 2-8, 1996.

[47]
Colin Boyd. A framework for design of key establishment protocols. In Information Security and Privacy, LNCS 1172, pages 146-157, 1996.

[48]
Colin Boyd. Extensional goals in authentication protocols. In Proceedings of the DIMACS Workshop on Design and Formal Verification of Security Protocols, Rutgers University, September 1997.

[49]
Stephen H. Brackin, Catherine Meadows, and Jonathan Millen. CAPSL interface for the NRL protocol analyzer. In 2nd IEEE Symposium on Application-Specific Systems and Software Engineering Technology (ASSET'99), pages ??--?? (10 pages), March 1999.

[50]
Stephen H. Brackin. An interface specification language for automatically analyzing cryptographic protocols. In Internet Society Symposium on Network and Distributed System Security, page 12 pages, February 1997.

[51]
Stephen H. Brackin. A state-based HOL theory of protocol failure. Technical Report ATR 98007, Arca Systems / Exodus Communications, 1997.

[52]
Stephen H. Brackin. Automatic analysis of cryptographic protocols. Technical Report ATR 99057, Arca Systems / Exodus Communications, July 1999.

[53]
Emmanuel Bresson, Olivier Chevassut, David Pointcheval, and Jean-Jacques Quisquater. Provably authenticated group diffie-hellman key exchange. In Proceedings of the 8th ACM Conference on Computer and Communications Security, pages 255-264, November 2001.

[54]
Emmanuel Bresson, Olivier Chevassut, David Pointcheval, and Jean-Jacques Quisquater. Provably authenticated group diffie-hellman key exchange - the dynamic case. In Advances in Cryptology - ASIACRYPT 2001, LNCS 2248, pages 290-309, December 2001.

[55]
Jeremy Bryans and Steve Schneider. CSP, PVS, and a recursive authentication protocol. In DIMACS Workshop on Design and Formal Verification of Security Protocols, page 20 pages, September 3-5, 1997.

[56]
Michael Burrows, Martín Abadi, and Roger Needham. A logic of authentication. Technical Report 39, Digital Equipment Corporation Systems Research Center, Palo Alto, California, USA, February 1989.

[57]
Michael Burrows, Martín Abadi, and Roger Needham. A logic of authentication. ACM Transactions on Computer Systems, 8(1):18-36, February 1990.

[58]
Levente Buttyán, Sebastian Staamann, and Uwe G. Wilhelm. A simple logic for authentication protocol design. In Proceedings of the 11th IEEE Computer Security Foundation Workshop, June 9-11, 1998.

[59]
Levente Buttyán. Formal methods in the design of cryptographic protocols (state of the art). Technical Report SSC/1999/38, Swiss Federal Institute of Technology (EPFL), Lausanne, Switzerland, November 1999.

[60]
Christian Cachin, Klaus Kursawe, and Victor Shoup. Random oracles in Constantinople: Practical asynchronous byzantine agreement using cryptography. In Proc. 19th ACM Symposium on Principles of Distributed Computing (PODC 2000), pages 123-132, July 2000.

[61]
C. Cachin, K. Kursawe, F. Petzold, and Victor Shoup. Secure and efficient asynchronous broadcast protocols. Technical Report RZ 3317, IBM Research, 2001.

[62]
Christian Cachin. Distributing trust on the Internet. In International Conference on Dependable Systems and Networks (DSN'01), pages 183-192, July 1-4, 2001.

[63]
CERT. CERT advisory: TCP SYN flooding and IP spoofing attacks. Technical Report CA-1996-21, Carnegie Mellon Software Engineering Institute, September 19, 1996. http://www.cert.org/advisories/CA-1996-21.html.

[64]
I. Cervesato, N. Durgin, P. Lincoln, J. Mitchell, and A. Scedrov. A meta-notation for protocol analysis. In Proceedings of the 12th IEEE Computer Security Foundations Workshop, June 1999.

[65]
Shaw-Cheng Chuang. Securing ATM networks. In Proceedings of the 3rd ACM Conference on Computer and Communications Security, CCS'96, pages 19-30, March 1996.

[66]
Edmund M. Clarke, Somesh Jha, and Will Marrero. A machine checkable logic of knowledge for specifying security properties of electronic commerce protocols. In Workshop on Formal Methods and Security Protocols, 1998.

[67]
Edmund M. Clarke, Somesh Jha, and Will Marrero. Using state exploration and a natural deduction style message derivation engine to verify security protocols. In Proceedings of the IFIP Working Conference on Programming Concepts and Methods (PROCOMET), 1998.

[68]
David A. Cooper and Kenneth P. Birman. The design and implementation of a private message service for mobile computers. Wireless Networks, 1(3):297-309, 1995.

[69]
Joan Daemen and Vincent Rijmen. AES proposal: Rijndael, September 1999.

[70]
Zhe Dang and Richard A. Kemmerer. Using the ASTRAL model checker for cryptographic protocol analysis. In DIMACS Workshop on Design and Formal Verification of Security Protocols, page 14 pages, September 3-5, 1997.

[71]
Bruno D'Ausbourg. Implementing secure dependencies over a network by designing a distributed security SubSystem. In Dieter Gollmann, editor, 3rd European Symposium on Research in Computer Security, ESORICS'94, LNCS 875, pages 249-266, November 7-9, 1994.

[72]
D. Davis and R. Swick. Network security via private-key certificates. ACM Operating Systems Review, 24(4):64-67, October 1990.

[73]
D. Davis, D. Geer, and T. Y. Ts'o. Kerberos with clocks adrift: History, protocols, and implementation. USENIX Computing Systems, 9(1), 1996.

[74]
M. Debbabi, M. Mejri, N. Tawbi, and I. Yahmadi. A new algorithm for the automatic verification of authentication protocols: From specifications to flaws and attack scenarios. In DIMACS Workshop on Design and Formal Verification of Security Protocols, page 19 pages, September 3-5, 1997.

[75]
Grit Denker and Jonathan Millen. CAPSL and CIL language design. Technical Report SRI-CSL-99-02, SRI International, Computer Science Lab, Menlo Park, CA, USA, February 1999.

[76]
T. Dierks and C. Allen. The TLS protocol, version 1.0, January 1999. RFC 2246.

[77]
W. Diffie and M. Hellman. New directions in cryptography. IEEE Transactions on Information Theory, 22(6):644-654, 1976.

[78]
Hans Dobbertin, Antoon Bosselaers, and Bart Preneel. RIPEMD-160: A strengthened version of RIPEMD. In Proceedings of Fast Software Encryption (FSE'96), LNCS 1039, pages 71-82. Springer Verlag, 1996.

[79]
D. Dolev and A. C. Yao. On the security of public key protocols. In Proceedings of the 22th IEEE Symposium on Foundations of Computer Science, pages 350-357, 1981.

[80]
Danny Dolev, Cynthia Dwork, Orli Waarts, and Moti Yung. Perfectly secure message transmission. Journal of the ACM, 40(1):17-47, January 1993.

[81]
Josep Domingo-Ferrer. Distributed user identification by zero-knowledge access rights proving. Information Processing Letters, 40(5):235-239, December 1991.

[82]
William A. Doster and Jim Rees. Third-party authentication in the institutional file system. Technical Report CITI TR 92-1, University of Michigan, Ann Arbor, MI, USA, February 1992.

[83]
A. Durante, R. Focardi, and R. Gorrieri. CVS: A compiler for the analysis of cryptographic protocols. In Proceedings of the 12th IEEE Computer Security Foundations Workshop, pages 203-212, June 1999.

[84]
Bruno Dutertre and Steve Schneider. Using a PVS embedding of CSP to verify authentication protocols. In Proceedings of the 10th IEEE Computer Security Foundation Workshop, pages 3-17, 1997.

[85]
Cynthia Dwork and Moni Naor. Pricing via processing or combatting junk mail. In Proceedings of Crypto'92, 1992.

[86]
Martin Dyer, Trevor Fenner, Alan Frieze, and Andrew Thomason. On key storage in secure networks. Journal Of Cryptology, 8:189-200, 1995.

[87]
Joan Dyer, Ron Perez, Sean W. Smith, and Mark Lindemann. Application support architecture for a high-performance, programmable secure coprocessor. In 22nd National Information Systems Security Conference, October 1999.

[88]
Joan G. Dyer, Mark Lindemann, Ronald Perez, Reiner Sailer, Leendert van Doorn, Sean W. Smith, and Steve Weingart. Building the IBM 4758 secure coprocessor. IEEE Computer, 34(10):57-65, October 2001.

[89]
Claudia Eckert. Tool-supported verification of cryptographic protocols. In IFIP 1998, 1998.

[90]
Erin English and Scott Hamilton. Network security under siege: The timing attack. Computer, 29(3):95-97, March 1996.

[91]
Pasi Eronen. Denial of service in public key protocols. In Paper presented in Helsinki University of Technology's Seminar on Network Security course (Fall 2000), December 2000.

[92]
R. Falk and M. Trommer. Integrated management of network and host based security mechanisms. In Colin Boyd and Ed Dawson, editors, 3rd Australasian Conference, ACISP'98, LNCS 1438, pages 36--??, July 13-15, 1998.

[93]
Jean-Claude Fernandez, Hubert Garavel, Alain Kerbrat, Radu Mateescu, Laurent Mounier, and Mihaela Sighireanu. CADP: A protocol validation and verification toolbox. In Rajeev Alur and Thomas A. Henzinger, editors, Proceedings of the 8th Conference on Computer-Aided Verification, LNCS 1102, pages 437-440, 1996.

[94]
J.F. Fhem, D. Veithen, and J.J. Quisquater. SCALPS: Smart card applied to little payment systems. IEEE Micro, 16(3):42-51, June 1996.

[95]
FIPS. Security requirements for cryptographic modules, FIPS PUB 140-2, 1999.

[96]
FIPS. Digital Signature Standard (DSS), FIPS PUB 186-2, January 27, 2000.

[97]
FIPS. Advanced Encryption Standard, FIPS PUB 197, November 2001.

[98]
FIPS. The Keyed-hash Message Authentication Code (HMAC), FIPS PUB 198, March 6, 2002.

[99]
FIPS. Secure Hash Standard, FIPS PUB 180-2, August 1, 2002.

[100]
R. Focardi and R. Gorrieri. Automatic compositional verification of some security properties. In Tiziana Margaria and Berhard Steffen, editors, Tools and Algorithms for the Construction and Analysis of Systems, 2nd International Workshop TACAS'96, LNCS 1055, pages 167-186. Springer Verlag, March 27-29, 1996.

[101]
Warwick Ford. Standardizing information technology security. StandardView, 2(2):64-71, 1994.

[102]
Armando Fox and Steven D. Gribble. Security on the move: Indirect authentication using Kerberos. In Proceedings of the 2nd Annual International Conference on Mobile Computing and Networking, pages 155-164, November 1996.

[103]
Yair Frankel, Amir Herzberg, Paul A. Karger, Hugo Krawczyk, Charles A. Kunzinger, and Moti Yung. Security issues in a CDPD wireless network. IEEE Personal Communications, pages 16-27, August 1995.

[104]
Walter Fumy. (local area) network security. In Bart Preneel, René Govaerts, and Joos Vandewalle, editors, Computer Security and Industrial Cryptography, ESAT Course'91, LNCS 741, pages 211-226, May 21-23, 1991.

[105]
Klaus Gaarder and Einar Snekkenes. Applying a formal analysis technique to the CCITT X.509 strong two-way authentication protocol. Journal Of Cryptology, 3:81-98, 1991.

[106]
J. Galvin and K. McCloghrie. RFC 1446: Security protocols for version 2 of the Simple Network Management Protocol (SNMPv2), April 1993. Status: HISTORIC.

[107]
Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms. In Advances in Cryptology: Proceedings of CRYPTO 1984, LNCS 0196, pages 10-18, 1985.

[108]
Hubert Garavel. An overview of the Eucalyptus toolbox. In Proceedings of COST247 International Workshop on Applied Formal Methods in System Design, pages 76-88, June 1996.

[109]
Lee Garber. Denial-of-service attacks rip the Internet. IEEE Computer, 33(4):12-17, April 2000.

[110]
Morrie Gasser. Access control and authentication in LANs. In Thomas A. Berson and Thomas Beth, editors, Proceedings of the Workshop on Local Area Network Security (LANSEC'89), LNCS 396, pages 19-30, Berlin, April 1989. Springer.

[111]
Edgardo Gerck. Overview of certification systems: X.509, CA, PGP and SKIP, July 2000. A previous version has been published at the '99 Black Hat Conference in Las Vegas, NV, USA.

[112]
F. Germeau and G. Leduc. A computer aided design of a secure registration protocol. In Proceedings of Formal Description Techniques (X) / Protocol Specification, Testing and Verification (XVII), FORTE/PSTV'97, Osaka, Japan, November 1997.

[113]
F. Germeau and G. Leduc. Model-based design and verification of security protocols using LOTOS. In Proceedings of the DIMACS Workshop on Design and Formal Verification of Security Protocols, Rutgers University, September 1997.

[114]
Thomer Michael Gil. MULTOPS: A data structure for denial-of-service attack detection. Master's thesis, Division of Mathematics and Computer Science, Vrije Universiteit, Netherlands, December 2000.

[115]
C. Gray Girling. Covert channels in LANs. IEEE Transactions on Software Engineering, 13(2):292-296, February 1987.

[116]
Frédéric Gittler and Anne C. Hopkins. The DCE security service. Hewlett-Packard Journal: technical information from the laboratories of Hewlett-Packard Company, 46(6):41-48, December 1995.

[117]
Jaeseung Go and Kwangjo Kim. Wireless authentication protocols preserving user anonymity. In Symposium on Cryptography and Information Security (SCIS'01), pages 159-164, January 23-26, 2001.

[118]
David Goldschlag, Michael Reed, and Paul Syverson. Onion Routing for anonymous and private Internet connections. Communications of the ACM, 42(2):39-41, February 1999.

[119]
David M. Goldschlag. Several secure store and forward devices. In Proceedings of the 3rd ACM Conference on Computer and Communications Security, CCS'96, pages 129-137, March 14-15, 1996.

[120]
Li Gong and Nachum Shacham. Multicast security and its extension to a mobile environment. Wireless Networks, 1(3):281-295, 1995.

[121]
Li Gong, Roger Needham, and R. Yahalom. Reasoning about belief in cryptographic protocols. In Proceedings of the IEEE Symposium on Research in Security and Privacy, pages 234-248, May 1990.

[122]
Li Gong, Patrick Lincoln, and John Rushby. Byzantine agreement with authentication: Observations and applications in tolerating hybrid and link faults. In Proceedings Dependable Computing for Critical Applications-5, pages 139-157, Champaign, IL, September 1995.

[123]
Li Gong. Using one-way functions for authentication. ACM Computer Communication Review, 19(5):8-11, October 1989.

[124]
Li Gong. A security risk of depending on synchronized clocks. ACM Operating Systems Review, 26(1):49-54, January 1992.

[125]
Li Gong. New protocols for third-party-based authentication and secure broadcast. In Proceedings of the 2nd ACM Conference on Computer and Communications Security, pages 176-183, Fairfax, VA, USA, November 2-4, 1994.

[126]
Li Gong. Efficient network authentication protocols: Lower bounds and optimal implementations. Distributed Computing, 9(3):131-145, 1995.

[127]
Goodman, Dancy, and Chandrakasan. An energy/security scalable encryption processor using an embedded variable voltage DC/DC converter. IEEE Journal of Solid-State Circuits, 33(11):1799-1809, November 1998.

[128]
James W. Gray and John D. McLean. Using temporal logic to specify and verify cryptographic protocols. In Proceedings of the 8th IEEE Computer Security Foundation Workshop, pages 108-116, 1995.

[129]
Stefanos Gritzalis and Diomidis Spinellis. Cryptographic protocols over open distributed systems: A taxonomy of flaws and related protocol analysis tools. In Peter Daniel, editor, 16th International Conference on Computer Safety, Reliability and Security (SAFECOMP'97), pages 123-137, York, UK, September 1997. European Workshop on Industrial Computer Systems: TC-7, Springer Verlag.

[130]
S. Gritzalis, D. Spinellis, and P. Georgiadis. Security protocols over open networks and distributed systems: Formal methods for their analysis, design and verification. Computer Communications, 22(8):697-709, May 1999.

[131]
Carl A. Gunter and Trevor Jim. Generalized certificate revocation. In ACM Symposium on Principles of Programming Languages, page (14 pages), January 2000.

[132]
Shai Halevi and Hugo Krawczyk. Public-key cryptography and password protocols. In Proceedings of the 5th ACM Conference on Computer and Communications Security, pages 122-131, San Francisco, CA, USA, November 2-5, 1998.

[133]
J. Daniel Halpern, Sam Owre, Norman Proctor, and William F. Wilson. Muse -- a computer assisted verification system. IEEE Transactions on Software Engineering, 13(2):151-156, February 1987.

[134]
Goichiro Hanaoka, Yuliang Zheng, and Hideki Imai. LITESET: A light-weight secure electronic transaction protocol. In Colin Boyd and Ed Dawson, editors, 3rd Australasian Conference, ACISP'98, LNCS 1438, pages ??--??, July 13-15, 1998.

[135]
Dan Harkins and Dave Carrel. The Internet Key Exchange (IKE), May 1999. INTERNET DRAFT (http://www.ietf.org/internet-drafts/draft-ietf-ipsec-ike-01.txt).

[136]
Jingmin He and Ed Dawson. Shared secret reconstruction. Designs, Codes and Cryptography, 14(3):221-237, September 1998.

[137]
Nevin Heintze and J. Doug Tygar. Timed models for protocol security. Technical Report CMU-CS-92-100, Carnegie Mellon University, January 1992.

[138]
Nevin Heintze and J. Tygar. A model for secure protocols and their compositions. IEEE Transactions on Software Engineering, 22(1):16-30, January 1996.

[139]
Günther Horn and Bart Preneel. Authentication and payment in future mobile systems. In European Symposium on Research in Computer Security (ESORICS'98), LNCS 1485, pages 277-293, 1998.

[140]
R. Housley, W. Polk, W. Ford, and D. Solo. RFC 3280: Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile, April 2002. http://www.ietf.org/rfc/rfc3280.txt.

[141]
Russell Housley. Encapsulation security protocol design for local area networks. In Thomas A. Berson and Thomas Beth, editors, Proceedings of the Workshop on Local Area Network Security (LANSEC'89), LNCS 396, pages 103-112, Berlin, April 1989. Springer.

[142]
Tzonelih Hwang and Yung-Hsiang Chen. On the security of SPLICE slash AS -- the authentication system in WIDE Internet. Information Processing Letters, 53(2):97-101, January 1995.

[143]
Tzonelih Hwang, Narn-Yih Lee, Chuan-Ming Li, Ming-Yung Ko, and Yung-Hsiang Chen. Two attacks on Neuman-Stubblebine authentication protocols. Information Processing Letters, 53(2):103-107, January 1995.

[144]
ISO/IEC. ITU-T Recommendation X.509, ISO/IEC 9594-8: Information technology -- open systems interconnection -- the directory: Public key and attribute certificate frameworks, May 2001. http://www-t.zhwin.ch/it/ksy/Block08/ITU/X509_4thEditionDraftV8.pdf.

[145]
Naomaru Itoi and Peter Honeyman. Pluggable authentication module for Windows NT. Technical Report CITI TR 98-1, University of Michigan, Ann Arbor, MI, USA, August 1998.

[146]
Wen-Ai Jackson, Keith M. Martin, and Christine M. O'Keefe. Mutually trusted authority-free secret sharing schemes. Journal Of Cryptology, 10:261-289, 1997.

[147]
Philippe A. Janson, Gene Tsudik, and Moti Yung. Scalability and flexibility in authentication services: The KryptoKnight approach. In Proceedings of IEEE INFOCOM'97, pages 725-736, April 1997.

[148]
Robert Jerdonek, Peter Honeyman, Kevin W. Coffman, Jim Rees, and Kip Wheeler. Implementation of a provably secure, Smartcard-based key distribution protocol. Technical Report CITI TR 98-4, University of Michigan, Ann Arbor, MI, USA, April 1998.

[149]
Audun Jøsang. A subjective metric of authentication. In Jean-Jacques Quisquater, Yves Deswarte, Catherine Meadows, and Dieter Gollmann, editors, 5rd European Symposium on Research in Computer Security, ESORICS'98, LNCS 1485, pages 329-344, September 16-18, 1998.

[150]
Ari Juels and John Brainard. Client puzzles: A cryptographic countermeasure against connection depletion attacks. In Proceedings of the 1999 Network and Distributed System Security Symposium (NDSS'99), 1999.

[151]
Günter Karjoth. Authorization in CORBA security. In Jean-Jacques Quisquater, Yves Deswarte, Catherine Meadows, and Dieter Gollmann, editors, 5rd European Symposium on Research in Computer Security, ESORICS'98, LNCS 1485, pages 143-158, September 16-18, 1998.

[152]
R. A. Kemmerer, Catherine A. Meadows, and J. Millan. Three systems for cryptographic protocol analysis. Journal of Cryptology, 7(2):79-130, 1994.

[153]
S. Kent. RFC 1422: Privacy enhancement for Internet electronic mail: Part II: Certificate-based key management, February 1993.

[154]
Angelos D. Keromytis and Jonathan M. Smith. Creating efficient fail-stop cryptographic protocols. Technical Report MS-CIS-96-32, University of Pennsylvania, December 1996.

[155]
Volker Kessler and Heike Neumann. A sound logic for analysing electronic commerce protocols. In Jean-Jacques Quisquater, Yves Deswarte, Catherine Meadows, and Dieter Gollmann, editors, 5rd European Symposium on Research in Computer Security, ESORICS'98, LNCS 1485, pages 345-360, September 16-18, 1998.

[156]
Kim Potter Kihlstrom, Louise E. Moser, and P. M. Melliar-Smith. The SecureRing protocols for securing group communication. In Proceedings of the 31st Annual Hawaii International Conference on System Sciences (HICSS), volume 3, pages 317-326. IEEE Computer Society Press, January 1998.

[157]
Darrell Kindred and Jeannette M. Wing. Fast, automatic checking of security protocols. In 2nd USENIX Workshop on Electronic Commerce, pages 41-52, November 1996.

[158]
Darrell Kindred and Jeannette M. Wing. Theory generation for security protocols. TOPLAS, 7, 1999.

[159]
Kimberly E. Kirkpatrick. Modeling a LAN security server. In Thomas A. Berson and Thomas Beth, editors, Proceedings of the Workshop on Local Area Network Security (LANSEC'89), LNCS 396, pages 113-138, Berlin, April 1989. Springer.

[160]
J. Kohl and C. Neuman. RFC 1510: The Kerberos Network Authentication Service (V5), September 1993. Status: PROPOSED STANDARD.

[161]
Jiejun Kong, Haiyun Luo, Kaixin Xu, Daniel Lihui Gu, Mario Gerla, and Songwu Lu. Adaptive security for multi-layer ad-hoc networks. Wireless Communications and Mobile Computing, August 2002. (to be published).

[162]
Tanya Korelsky, Bill Dean, Carl Eichenlaub, James Hook, Carl Klapper, Marcos Lam, Daryl McCullough, Garrel Pottinger, Owen Rambow, David Rosenthal, Jonathan P. Seldin, and D. G. Weber. Security modeling in the Ulysses environment. In Proceedings of the 4th Annual Computer Security Applications Conference, 1988.

[163]
Joseph M. Kusmiss. Reassurance for the electronically insecure: Review of Network and Internetwork Security: Principles and Practices. IEEE Software, 12(3):103, May 1995.

[164]
RSA Laboratories. Answers to Frequently Asked Questions About Today's Cryptography. RSA Security Inc., version 4.1 edition, May 2000.

[165]
Xuejia Lai and James L. Massey. A proposal for a new block encryption standard. In Advances in Cryptology - Eurocrypt'90, pages 389-404. Springer-Verlag, 1991.

[166]
Xuejia Lai, James L. Massey, and Sean Murphy. Markov ciphers and differential cryptanalysis. In Advances in Cryptology - Eurocrypt'91, LNCS 547, pages 17-38. Springer-Verlag, 1991.

[167]
Paul A. Lambert. Architectural considerations for LAN security protocols. In Thomas A. Berson and Thomas Beth, editors, Proceedings of the Workshop on Local Area Network Security (LANSEC'89), LNCS 396, pages 5-12, Berlin, April 1989. Springer.

[168]
Butler W. Lampson, Martín Abadi, Michael Burrows, and Edward Wobber. Authentication in distributed systems: Theory and practice. ACM Transactions on Computer Systems, 10(4):265-310, November 1992.

[169]
Butler W. Lampson. Technology to achieve secure computer systems. In Computers at Risk, pages 74-101. National Academy Press, 1991.

[170]
Guy Leduc, O. Bonaventure, E. Koerner, Luc Léonard, C. Pecheur, and D. Zanetti. Specification and verification of a TTP protocol for the conditional access to services. In Proceedings of 12th J. Cartier Workshop on Formal Methods and their Applications: Telecommunications, VLSI and Real-Time Computerized Control System, October 2-4, 1996.

[171]
G. Leduc. Verification of two versions of the Challenge Handshake Authentication Protocol (CHAP). Annals of Telecommunications, 1999. (to appear).

[172]
Jussipekka Leiwo, Tuomas Aura, and Pekka Nikander. Towards network denial of service resistant protocols. In Proceedings of the 15th International Information Security Conference (IFIP/SEC 2000), pages 301-310, August 2000.

[173]
K. H. Leung, K. W. Ma, W. K. Wong, and P. H. W. Leong. FPGA implementation of a microcoded elliptic curve cryptographic processor. In Proceedings of Field-Programmable Custom Computing Machines (FCCM'00), pages 68-76, 2000.

[174]
Randall W. Lichota, Grace L. Hammonds, and Stephen H. Brackin. Verifying the correctness of cryptographic protocols using "Convince". In Proceedings of the 12th Annual Computer Security Applications Conference, page 12 pages, December 1996.

[175]
Armin Liebl. Authentication in distributed systems: A bibliography. ACM Operating Systems Review, 27(4):31-41, 1993.

[176]
Chae Hoon Lim and Pil Joong Lee. Several practical protocols for authentication and key exchange. Information Processing Letters, 53(2):91-96, January 1995.

[177]
Hung-Yu Lin and Lein Harn. Authentication protocols for personal communication systems. In Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, pages 256-261, August 1995.

[178]
J. Linn. Generic security service application program interface, version 2, January 1997. RFC 2078 (http://aurora.rg.iupui.edu/doc/rfc/rfc-html/rfc2078.html).

[179]
T. Mark A. Lomas, Li Gong, Jerome H. Saltzer, and Roger M. Needham. Reducing risks from poorly chosen keys. In Proceedings of the 12th ACM Symposium on Operating Systems Principles, pages 14-18, December 1989.

[180]
Gavin Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In Tiziana Margaria and Berhard Steffen, editors, Tools and Algorithms for the Construction and Analysis of Systems, 2nd International Workshop TACAS'96, LNCS 1055, pages 147-166. Springer Verlag, March 27-29, 1996.

[181]
Gavin Lowe. A hierarchy of authentication specification. In Proceedings of the 1997 IEEE Computer Society Symposium on Research in Security and Privacy, pages 31-43, 1997.

[182]
Gavin Lowe. Casper: A compiler for the analysis of security protocols. http://www.mcs.le.ac.uk/~glowe/Security/Casper/casper.ps, July 6, 1998.

[183]
Dahlia Malkhi and Michael Reiter. Byzantine quorum systems. Distributed Computing, 11(4):203-213, 1998.

[184]
Dahlia Malkhi, Elan Pavlov, and Yaron Sella. Optimal unconditional information diffusion. In DISC'01, 2001.

[185]
Dahlia Malkhi. Quorum systems, 1999. Chapter in The Encyclopedia of Distributed Computing, Joseph Urban and Partha Dasgupta (eds.), Kluwer Academic Publishers.

[186]
Will Marrero, Edmund Clarke, and Somesh Jha. A model checker for authentication protocols. In DIMACS Workshop on Design and Formal Verification of Security Protocols, page 19 pages, September 3-5, 1997.

[187]
Anish Mathuria, Reihaneh Safavi-Naini, and Peter Nickolas. Some remarks on the logic of Gong, Needham and Yahalom. In Proceedings of the International Computer Symposium 1994, volume 1, pages 303-308, December 12-14, 1994.

[188]
Kanta Matsuura and Hideki Imai. Protection of authenticated key-agreement protocol against a denial-of-service attack. In Proceedings of International Symposium on Information Theory and Its Applications (ISITA'98), pages 466-470, October 1998.

[189]
Kanta Matsuura and Hideki Imai. Modification of Internet Key Exchange resistant against denial-of-service. In Pre-Proc. of Internet Workshop 2000 (IWS2000), pages 167-174, February 2000.

[190]
Sjouke Mauw. The formalization of Message Sequence Charts.

[191]
Sjouke Mauw. Message Sequence Charts (MSC).

[192]
Patrick McDaniel, Peter Honeyman, and Atul Prakash. Lightweight secure group communication. Technical Report CITI TR 98-2, University of Michigan, Ann Arbor, MI, USA, April 1998.

[193]
Patrick D. McDaniel, Atul Prakash, and Peter Honeyman. Antigone: A flexible framework for secure group communication. Technical Report CITI TR 99-2, University of Michigan, Ann Arbor, MI, USA, September 1999.

[194]
Catherine Meadows and David Mutchler. Matching secrets in the absence of a continuously available trusted authority. IEEE Transactions on Software Engineering, 13(2):289-292, February 1987.

[195]
Catherine Meadows and Paliath Narendran. A unification algorithm for the group diffie-hellman protocol, January14-15, 2002.

[196]
Catherine A. Meadows. Applying formal methods to the analysis of a key management protocol. Journal of Computer Security, 1(1):5-36, 1992.

[197]
Catherine A. Meadows. Formal verification of cryptographic protocols: A survey. In Josef Pieprzyk and Reihanah Safavi-Naini, editors, Advances in Cryptology - ASIACRYPT'94, LNCS 917, pages 133-150. Springer Verlag, November 27-29, 1994.

[198]
Catherine A. Meadows. The NRL protocol analyzer: An overview. Journal of Logic Programming, 19/20:19 pages, 1994.

[199]
Catherine A. Meadows. Analyzing the Needham-Schroeder public key protocol: A comparison of two approaches. In Elisa Bertino, Helmut Kurth, Giancarlo Martella, and Emilio Montolivo, editors, 4rd European Symposium on Research in Computer Security, ESORICS'96, LNCS 1146, pages 351-364, September 25-27, 1996.

[200]
Catherine A. Meadows. The NRL protocol analyzer: An overview. Journal of Logic Programming, 26(2):113-131, 1996.

[201]
Catherine A. Meadows. Analysis of the Internet Key Exchange protocol using the NRL protocol analyzer. In Proceedings of the 1999 IEEE Symposium on Security and Privacy, May 1999.

[202]
Catherine A. Meadows. A formal framework and evaluation method for network denial of service. In Proceedings of the 12th IEEE Computer Security Foundation Workshop, June 1999.

[203]
Catherine Meadows. Open issues in formal methods for cryptographic protocol analysis. In Proceedings of DISCEX 2000, pages 237-250, January 2000.

[204]
Catherine Meadows. A cost-based framework for analysis of denial of service in networks. Journal of Computer Security, 9(1-2):143-164, 2001.

[205]
Ralph C. Merkle. Secure communications over insecure channels. Communications of the Association for Computing Machinery, 21(4):294-299, April 1978.

[206]
Markus Michels, Markus Stadler, and Hung-Min Sun. On the security of some variants of the RSA signature scheme. In Jean-Jacques Quisquater, Yves Deswarte, Catherine Meadows, and Dieter Gollmann, editors, 5rd European Symposium on Research in Computer Security, ESORICS'98, LNCS 1485, pages 85-96, September 16-18, 1998.

[207]
Jonathan K. Millen, Sidney C. Clark, and Sheryl B. Freedman. The Interrogator: Protocol security analysis. IEEE Transactions on Software Engineering, 13(2):274-288, February 1987.

[208]
S. P. Miller, B. C. Neuman, J. I. Schiller, and J. H. Saltzer. Kerberos authentication and authorization system. Project Athena Technical Plan, Section E.2.1.

[209]
S. P. Miller, J. I. Neumann, J. I. Schiller, and J. H. Saltzer. Kerberos authentication and authorisation system. Technical Report Project Athena Technical Plan, Sec. E.2.1, MIT, 1989.

[210]
David L. Mills. NTP timescale and leap seconds. http://www.eecis.udel.edu/~ntp/ntp_spool/html/leap.htm.

[211]
John C. Mitchell, Mark Mitchell, and Ulrich Stern. Automated analysis of cryptographic protocols using Mur phi . In Proceedings of the 1997 IEEE Symposium on Security and Privacy, pages 141-151, May 1997.

[212]
John C. Mitchell, Vitaly Shmatikov, and Ulrich Stern. Finite-state analysis of SSL 3.0 and related protocols. In Proceedings of the DIMACS Workshop on Design and Formal Verification of Security Protocols, Rutgers University, September 1997.

[213]
Roger Needham and M. D. Schroeder. Authentication revisited. ACM Operating Systems Review, 21(1):7, January 1987.

[214]
Roger M. Needham. Denial of service: An example. Communications of the ACM, 37(11):42-46, November 1994.

[215]
B. Clifford Neuman and Stuart G. Stubblebine. A note on the use of timestamps as nonces. ACM Operating Systems Review, 27(2):10-14, April 1993.

[216]
Clifford Neuman, John Kohl, and Theodore T'so. The Kerberos network authentication service (V5), March 10, 2000. INTERNET-DRAFT, Expires September 10, 2000.

[217]
B. Clifford Neuman. Protection and security issues for future systems. In Arthur Karshmer and J. Nehmer, editors, Workshop on Operating Systems of the 90s and Beyond, LNCS 563, pages 184-201. Springer Verlag, July 8-12, 1991.

[218]
Peter G. Neumann. Inside risks: Denial-of-service attacks. Communications of the ACM, 43(4):136, 2000.

[219]
Algirdas Pak v stas and Sonata Pak v stiene. Standards: NSK: A Norwegian cryptochip for supersafe communications. Computer, 29(2):78-79, February 1996.

[220]
Se Hyun Park, Aura Ganz, and Zvi Ganz. Security protocol for IEEE 802.11 wireless local area network. Mobile Networks and Applications, 3(3):237-246, 1998.

[221]
DongGook Park, JungJoon Kim, Colin Boyd, and Ed Dawson. Cryptographic salt: A countermeasure against denial-of-service attacks. In 6th Australasian Conference on Information Security and Privacy (ACISP'01), LNCS 2119, pages 344-343, July11-13, 2001.

[222]
Jaegwan Park, Jaeseung Go, and Kwangjo Kim. Wireless authentication protocol preserving user anonymity. In 4th International Symposium on Wireless Personal Multimedia Communications (WPMC'01), pages 1153-1158, September 9-12, 2001.

[223]
Lawrence C. Paulson. Inductive analysis of the internet protocol TLS. Technical Report 440, Computer Laboratory, University of Cambridge, England, December 16, 1997.

[224]
Lawrence C. Paulson. On two formal analyses of the Yahalom protocol. Technical Report 432, Computer Laboratory, Cambridge University, July 1997.

[225]
Lawrence C. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6:85-128, 1998.

[226]
Cem Paya. A framework for world wide web client-authentication protocols. Technical Report PCS-TR98-328, Dartmouth College, Computer Science, Hanover, NH, USA, March 1998.

[227]
Adrian Perrig and Dawn Xiaodong Song. A first step on automatic protocol generation. In Proceedings of Network and Distributed System Security, February 2000.

[228]
Adrian Perrig and Dawn Xiaodong Song. Looking for diamonds in the dessert --- extending automatic protocol generation to three-party authentication and key distribution. In Proc. of IEEE Computer Security Foundation Workshop, July 2000.

[229]
Y. Kim. A. Perrig and G. Tsudik. Simple and fault-tolerant key agreement for dynamic collaborative groups. In ACM CCS'2000, November 2000.

[230]
Y. Kim. A. Perrig and G. Tsudik. Communication-efficient group key agreement. In IFIP-SEC 2001, June 2001.

[231]
Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J. Doug Tygar. SPINS: Security suite for sensor networks. In Conference on Mobile Computing and Networking (MOBICOM'01), July16-21, 2001.

[232]
David Powell, André Adelsbach, and Christian Cachin. MAFTIA (malicious- and accidental-fault tolerance for Internet applications). In International Conference on Dependable Systems and Networks (DSN'01), pages D-32 -- D-35, July 1-4, 2001.

[233]
M. Reiter and A. Rubin. Crowds: Anonymity for web transactions. In ACM TISSEC, June 1999.

[234]
Michael K. Reiter, Kenneth P. Birman, and Li Gong. Integrating security in a group oriented distributed system. Technical Report TR92-1269, Cornell University, Computer Science, February 1992.

[235]
Michael K. Reiter. A security architecture for fault-tolerant systems. Master's thesis, Cornell University, Computer Science, July 1993. available as Technical Report TR93-1367.

[236]
Michael K. Reiter. Secure agreement protocols: Reliable and atomic group multicast in Rampart. In Proceedings of the 2nd ACM Conference on Computer and Communications Security, pages 68-80, November 2-4, 1994.

[237]
Michael K. Reiter. A secure group membership protocol. IEEE Transactions on Software Engineering, 22(1):31-42, January 1996.

[238]
Livio Ricciulli, Patrick Lincoln, and Pankaj Kakkar. TCP SYN flooding defense. In Simulation Multiconference CNDS'99, January 17-20 1999.

[239]
Ronald L. Rivest and Butler Lampson. SDSI -- A simple distributed security infrastructure. In Presented at CRYPTO'96 Rumpsession, 1996.

[240]
Ronald L. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(12):120-126, February 1978.

[241]
Ronald L. Rivest. RFC 1321: The MD5 message-digest algorithm, April 1992.

[242]
Ohad Rodeh, Ken Birman, Mark Hayden, and Danny Dolev. Dynamic virtual private networks. Technical Report TR98-1695, Cornell University, Computer Science, August 1998.

[243]
A. W. Roscoe and M. H. Goldsmith. The perfect ``spy'' for model-checking cryptoprotocols. In Proceedings of the DIMACS Workshop on Design and Formal Verification of Security Protocols, Rutgers University, September 1997.

[244]
A. W. Roscoe. Intensional specifications of security protocols. In 9th IEEE Computer Security Foundation Workshop, pages 28-38, 1996.

[245]
A. Royo, J. Moron, and J. López. Design and implementation of a coprocessor for cryptography applications. In Proceedings of European Design & Test Conference, 1997.

[246]
A. D. Rubin and Peter Honeyman. Formal methods for the analysis of authentication protocols. Technical Report CITI TR 93-7, University of Michigan, Ann Arbor, MI, USA, October 1993.

[247]
A. D. Rubin and Peter Honeyman. Long running jobs in an authenticated environment. In Proceedings of the Fourth USENIX UNIX Security Symposium, September 1993.

[248]
A. D. Rubin and Peter Honeyman. Long running jobs in an authenticated environment. Technical Report CITI TR 93-1, University of Michigan, Ann Arbor, MI, USA, March 1993. (appeared in Proc. Fourth USENIX UNIX Security Symp.).

[249]
A. D. Rubin. Nonmonotonic cryptographic protocols. Technical Report CITI TR 93-9, University of Michigan, Ann Arbor, MI, USA, November 1993. (appeared in Proc. IEEE Comp. Security Foundations Workshop VII).

[250]
A. D. Rubin. Nonmonotonic cryptographic protocols. In Proceedings of the 7th IEEE Computer Security Foundation Workshop, June 1994.

[251]
Ekkart Rudolph, Peter Graubmann, and Jens Grabowski. Tutorial on Message Sequence Charts.

[252]
John Rushby. Systematic formal verification for fault-tolerant time-triggered algorithms. IEEE Transactions on Software Engineering, 25(5):651-660, September 1999.

[253]
Peter Ryan and Irfan Zakiuddin. Modelling and analysis of security protocols. In DIMACS Workshop on Design and Formal Verification of Security Protocols, page 22 pages, September 3-5, 1997.

[254]
Elton Saul and Andrew Hutchison. SPEAR II. In South African Telecommunications, Networks and Applications Conference (SATNAC'99), September 6-8, 1999.

[255]
E. Saul and A.C.M. Hutchison. An environment to facilitate the teaching of GNY-based security protocol analysis techniques. In Proceedings of the Second World Conference in Information Security Education, pages 285-305, July 2001.

[256]
E. Saul and A.C.M. Hutchison. Using GYPSIE, GYNGER and Visual GNY to analyze cryptographic protocols in SPEAR II. In Proceedings of the Eighth Annual Working Conference on Information Security Management and Small Systems Security, September 2001.

[257]
Steve Schneider. Verifying authentication protocols with CSP. In 10th IEEE Computer Security Foundation Workshop, pages 3-17, 1997.

[258]
Bruce Schneier and John Kelsey. Remote auditing of software outputs using a trusted coprocessor. Future Generation Computer Systems, 13(1):9-18, 1997.

[259]
Bruce Schneier and Mudge. Cryptanalysis of Microsoft's point-to-point tunneling protocol (PPTP). In Proceedings of the 5th ACM Conference on Computer and Communications Security, pages 132-141, San Francisco, CA, USA, November 2-5, 1998.

[260]
Bruce Schneier. Applied Cryptography: Protocols, Algorithms, and Source Code in C. John Wiley & Sons, second edition, 1996.

[261]
Gisbert W. Selke. Kryptographie: Verfahren, Ziele, Einsatzmöglichkeiten. O'Reilly Verlag, 2000. (german).

[262]
Peter Sewell and Jan Vitek. Secure composition of insecure components. In Proceedings of the 12th IEEE Computer Security Foundation Workshop, June 1999.

[263]
Peter Sewell and Jan Vitek. Secure composition of insecure components. Technical Report 463, Computer Laboratory, University of Cambridge, April 1999.

[264]
M. Shand and J. Vuillemin. Fast implementations of RSA cryptography. In Proceedings of the 11th IEEE Symposium on Computer Arithmetic, pages 252-259, 1993.

[265]
Vitaly Shmatikov and John C. Mitchell. Analysis of a fair exchange protocol. In Proceedings of the 1999 FLoC Workshop on Formal Methods and Security Protocols, Trento, Italy, 1999.

[266]
Victor Shoup. Practical threshold signatures. In Proc. Eurocrypt 2000, 1999.

[267]
P. Sinha, N. Venkitaraman, T. Nandagopal, R. Sivakumar, and V. Bharghavan. A wireless transmission control protocol for CDPD. In IEEE Wireless Communications and Networking Conference, September 1999.

[268]
P. Sinha, N. Venkitaraman, R. Sivakumar, and V. Bharghavan. WTCP: A reliable transport protocol for wireless wide-area networks. In ACM Mobicom '99, August 1999.

[269]
Sean W. Smith and Steve Weingart. Building a high-performance, programmable secure coprocessor. Computer Networks, 31:831-860, 1999.

[270]
Sean W. Smith, Ron Perez, Steve H. Weingart, and Vernon Austel. Validating a high-performance, programmable secure coprocessor. In 22nd National Information Systems Security Conference, October 1999.

[271]
Dawn X. Song and Adrian Perrig. Advanced and authenticated marking schemes for IP traceback. Technical Report UCB/CSD-00-1107, Computer Science Division (EECS), University of California, Berkeley, USA, June 2000.

[272]
Dawn X. Song and Adrian Perrig. Advanced and authenticated marking schemes for IP traceback. In Proceedings IEEE Infocom 2001, April 22-26, 2001.

[273]
Dawn Xiaodong Song. Athena: An automatic checker for security protocol analysis. In Proceedings of the 12th IEEE Computer Security Foundations Workshop, June 1999.

[274]
M. Stangel and V. Bharghavan. Improving TCP performance in mobile computing environments. In International Conference on Communications '98, June 1998.

[275]
Jennifer G. Steiner, Clifford Neuman, and Jeffrey I. Schiller. Kerberos: An authentication service for open network systems. In USENIX Association, editor, USENIX Conference Proceedings (Dallas, TX, USA), pages 191-202, Berkeley, CA, USA, Winter 1988. USENIX Association.

[276]
Michael Steiner, Gene Tsudik, and Michael Waidner. Diffie-Hellman key distribution extended to group communication. In Proceedings of the 3rd ACM Conference on Computer and Communications Security, CCS'96, pages 31-37, March 14-15, 1996.

[277]
Michael Steiner, Gene Tsudik, and Michael Waidner. CLIQUES: A new approach to group key agreement. In Proceedings of the ICDCS, May 1998.

[278]
Frank A. Stevenson. Cryptanalysis of Contents Scrambling System, 1999.

[279]
Doug R. Stinson and Tran van Trung. Some new results on key distribution patterns and broadcast encryption. Designs, Codes and Cryptography, 14(3):261-279, September 1998.

[280]
Stuart G. Stubblebine and Rebecca N. Wright. An authentication logic supporting synchronization, revocation, and recency. In Proceedings of the 3rd ACM Conference on Computer and Communications Security, CCS'96, pages 95-105, March 14-15, 1996.

[281]
Hung-Min Sun and Shiuh-Pyng Shieh. Cryptanalysis of private-key encryption schemes based on burst-error-correcting codes. In Proceedings of the 3rd ACM Conference on Computer and Communications Security, CCS'96, pages 153-156, March 14-15, 1996.

[282]
P. Syverson and Catherine Meadows. A logical language for specifying cryptographic protocol requirements. In Proceedings of the 1993 IEEE Computer Society Symposium on Research in Security and Privacy, pages 165-177, 1993.

[283]
P. Syverson and Catherine Meadows. Formal requirements for key distribution protocols. In Advances in Cryptology - Eurocrypt'94, pages 320-331, 1995.

[284]
P. Syverson and Catherine Meadows. A formal language for cryptographic protocol requirements. Designs, Codes, and Cryptography, 7(1/2):27-59, 1996.

[285]
P. Syverson and P. van Oorschot. On unifying some cryptographic protocol logics. In Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, pages 14-28, 1994.

[286]
P. Syverson. On key distribution protocols for repeated authentication. ACM Operating Systems Review, 27(4):24-30, October 1993.

[287]
P. Syverson. A taxonomy of replay attacks. In Proceedings of the 7th IEEE Computer Security Foundations Workshop, 1994.

[288]
P. Syverson. Limitations on design principles for public key protocols. In Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, pages 62-73, 1996.

[289]
Alexander Tiountchik and Elena Trichina. RSA acceleration with field programmable gate arrays. Lecture Notes in Computer Science, 1587:164-176, 1999.

[290]
Martin Tompa and Heather Woll. How to share a secret with cheaters. Journal Of Cryptology, 1:133-138, 1988.

[291]
Gene Tsudik. Message authentication with one-way hash functions. ACM SIGCOMM Computer Communication Review, 22(5):29-38, October 1992.

[292]
Marten van Dijk, Christian Gehrmann, and Ben Smeets. Unconditionally secure group authentication. Designs, Codes and Cryptography, 14(3):281-296, September 1998.

[293]
Serge Vaudenay. An experiment on DES statistical cryptanalysis. In Proceedings of the 3rd ACM Conference on Computer and Communications Security, CCS'96, pages 139-147, March 14-15, 1996.

[294]
Klaus Vedder. Security aspects of mobile communications. In Bart Preneel, René Govaerts, and Joos Vandewalle, editors, Computer Security and Industrial Cryptography, ESAT Course'91, LNCS 741, pages 193-210, May 21-23, 1991.

[295]
Jan Vitek, Manuel Serrano, and Dimitris Thanos. Security and communication in mobile object systems. In Jan Vitek and Christian Tschudin, editors, Mobile Object Systems: Towards the Programmable Internet (MOS'96), LNCS 1222, pages 177-200. Springer Verlag, April 1997.

[296]
Haining Wang, Danlu Zhang, and Kang G. Shin. Detecting SYN flooding attacks. In IEEE Infocom 2002, June 23-27, 2002.

[297]
Richard Ward. OSI network security and the NTCB. In Thomas A. Berson and Thomas Beth, editors, Proceedings of the Workshop on Local Area Network Security (LANSEC'89), LNCS 396, pages 67-74, Berlin, April 1989. Springer.

[298]
Gabriele Wedel and Volker Kessler. Formal semantics for authentication logics. In Elisa Bertino, Helmut Kurth, Giancarlo Martella, and Emilio Montolivo, editors, 4rd European Symposium on Research in Computer Security, ESORICS'96, LNCS 1146, pages 219-240, September 25-27, 1996.

[299]
Michael J. Wiener. Performance comparison of public-key cryptosystems. CryptoBytes Technical Newsletter, 4(1):1-5, Summer 1998. ftp://ftp.rsasecurity.com/pub/cryptobytes/crypto4n1.pdf.

[300]
Steve R. Wilbur, Jon Crowcroft, and Yuko Muroyama. MAC layer security measures in local area networks. In Thomas A. Berson and Thomas Beth, editors, Proceedings of the Workshop on Local Area Network Security (LANSEC'89), LNCS 396, pages 53-66, Berlin, April 1989. Springer.

[301]
Uwe G. Wilhelm, Sebastian Staamann, and Levente Buttyán. Introducing trusted third parties to the mobile agent paradigm. In Jan Vitek and Christian Jensen, editors, Secure Internet Programming: Security Issues for Mobile and Distributed Objects, LNCS 1603. Springer Verlag, 1999.

[302]
Manfred Wolf. Covert channels in LAN protocols. In Thomas A. Berson and Thomas Beth, editors, Proceedings of the Workshop on Local Area Network Security (LANSEC'89), LNCS 396, pages 91-102, Berlin, April 1989. Springer.

[303]
Thomas Y. C. Woo and Simon S. Lam. Authentication for distributed systems. Computer, 25(1):39-52, January 1992.

[304]
Thomas Y. C. Woo and Simon S. Lam. A semantic model for authentication protocols. In Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, pages 178-194, 1993.

[305]
Thomas Y. C. Woo and Simon S. Lam. A lesson on authentication protocol design. ACM Operating Systems Review, 28(3):24-37, July 1994.

[306]
Anthony A. Wood and John A. Stankovic. Denial of service in sensor networks. IEEE Computer, 35(10):54-62, October 2002.

[307]
R. Yahalom, B. Klein, and T. Beth. Trust relations in secure systems -- a distributed authentication perspective. In Proceedings of the 1993 IEEE Computer Society Symposium on Security and Privacy (SSP'93), pages 150-164, 1993.

[308]
Bennet S. Yee and J. Doug Tygar. Secure coprocessors in electronic commerce applications. In Proceedings 1995 USENIX Electronic Commerce Workshop, 1995.

[309]
Bennet S. Yee. Using Secure Coprocessors. PhD thesis, Carnegie Mellon University, May 1994.

[310]
Yongguang Zhang and Wenke Lee. Intrusion detection in wireless ad-hoc networks. In Proceedings of the 6th Conference on Mobile Computing and Networking, pages 275-283, August 6-11, 2000.

[311]
Lidong Zhou and Zygmunt J. Haas. Securing ad hoc networks. IEEE Network, 13(6):24-30, 1999.

[312]
Lidong Zhou, Fred B. Schneider, and Robbert van Renesse. COCA: A secure distributed on-line certification authority. Technical Report TR2000-1828, Computer Science Department, Cornell University, December 2000.

[313]
Lidong Zhou. Towards Fault-Tolerant and Secure On-Line Services. PhD thesis, Department of Computer Science, Cornell University, Ithaca, NY USA, May 2001.

[314]
Reto Zimmermann, Andreas Curiger, Heinz Bonnenberg, Hubert Kaeslin, Norbert Felber, and Wolfgang Fichtner. A 177 Mbit/s VLSI implementation of the International Data Encryption Algorithm. IEEE Journal of Solid-State Circuits, 29(3):303-307, March 1994.

[315]
André Zúquete and Paulo Guedes. Transparent authentication and confidentiality for stream sockets -- ensuring private network communications for Unix and Windows systems. IEEE Micro, 16(3):34-41, June 1996.