An Attack on the Needham−Schroeder Public−Key Authentication Protocol
Main Author: | Lowe, G |
---|---|
Format: | Journal article |
Published: |
1995
|
Similar Items
-
Breaking and Fixing the Needham−Schroeder Public−Key Protocol Using FDR
by: Lowe, G
Published: (1996) -
Breaking and Fixing the Needham−Schroeder Public−Key Protocol Using FDR
by: Lowe, G
Published: (1996) -
A Family of Attacks upon Authentication Protocols
by: Lowe, G
Published: (1997) -
Efficient DDoS attack immune authentication and key agreement protocol for LTE
by: Li, Luying
Published: (2013) -
Review of: Needham, Rodney: Reconnaissances
by: Bowman, G
Published: (1981)