共 50 条
- [1] Breaking and fixing public-key Kerberos ADVANCES IN COMPUTER SCIENCE - ASIAN 2006: SECURE SOFTWARE AND RELATED ISSUES, 2007, 4435 : 167 - +
- [2] Breaking and fixing the Needham-Schroeder public-key protocol using FDR SOFTWARE-CONCEPTS AND TOOLS, 1996, 17 (03): : 93 - 102
- [4] Cryptographically sound security proofs for basic and public-key Kerberos International Journal of Information Security, 2011, 10
- [5] An improved way on Kerberos protocol based on public-key algorithms Ruan Jian Xue Bao/Journal of Software, 2001, 12 (06): : 872 - 877
- [6] Cryptographically sound security proofs for basic and public-key Kerberos COMPUTER SECURITY - ESORICS 2006, PROCEEDINGS, 2006, 4189 : 362 - 383
- [7] Breaking and repairing asymmetric public-key traitor tracing DIGITAL RIGHTS MANAGEMENT, 2002, 2696 : 32 - 50
- [9] BREAKING A CLASS OF PUBLIC-KEY CRYPTOSYSTEMS WITH EUCLID ALGORITHM CHINESE SCIENCE BULLETIN, 1991, 36 (10): : 873 - 876
- [10] A parameterized analysis of public-key protocols:Needham-Schroeder and Kerberos-5 ICON: 2006 IEEE INTERNATIONAL CONFERENCE ON NETWORKS, VOLS 1 AND 2, PROCEEDINGS: NETWORKING -CHALLENGES AND FRONTIERS, 2006, : 294 - +