Abstract | ||
---|---|---|
this report hashelped us in analyzing certain aspects of authentication protocols. Our logicconsists of a simple set of inference rules, in a notation designed specificallyfor the study of authentication protocols. |
Year | Venue | Keywords |
---|---|---|
1989 | Distributed Computing And Cryptography | authentication protocol,inference rule |
Field | DocType | Citations |
Wide Mouth Frog protocol,Lightweight Extensible Authentication Protocol,Challenge-Handshake Authentication Protocol,Generic Bootstrapping Architecture,Challenge–response authentication,Computer security,Computer science,Otway–Rees protocol,Data Authentication Algorithm,Authentication protocol | Conference | 5 |
PageRank | References | Authors |
0.58 | 8 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Michael Burrows | 1 | 5 | 0.58 |
Martín Abadi | 2 | 12074 | 1324.31 |
Roger M. Needham | 3 | 4648 | 2075.99 |