On the security of public key protocols
- 1 March 1983
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Information Theory
- Vol. 29 (2), 198-208
- https://doi.org/10.1109/tit.1983.1056650
Abstract
No abstract availableThis publication has 8 references indexed in Scilit:
- The Byzantine generals strike againJournal of Algorithms, 1982
- Reaching Agreement in the Presence of FaultsJournal of the ACM, 1980
- Using encryption for authentication in large networks of computersCommunications of the ACM, 1978
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978
- A Linear Time Algorithm for Deciding Subject SecurityJournal of the ACM, 1977
- New directions in cryptographyIEEE Transactions on Information Theory, 1976
- Protection in operating systemsCommunications of the ACM, 1976
- Multiuser cryptographic techniquesPublished by Association for Computing Machinery (ACM) ,1976