Pgpfone: Pretty good privacy phone owner's manual, version 1, 1996. ,
The Cocaine Auction Protocol: On the Power of Anonymous Broadcast. Information Hiding, pp.434-447, 2000. ,
A logic of Authentication, DEC System Research Center, vol.22, 1990. ,
Entity authentication and key distribution. Crypto'93, pp.232-249, 1993. ,
DOI : 10.1007/3-540-48329-2_21
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.62.3423
On unifying some cryptographic protocol logics, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy, pp.1063-7109, 1994. ,
DOI : 10.1109/RISP.1994.296595
URL : http://www.dtic.mil/get-tr-doc/pdf?AD=ADA465512
What do we mean by entity authentication?, Proceedings 1996 IEEE Symposium on Security and Privacy, pp.46-54, 1996. ,
DOI : 10.1109/SECPRI.1996.502668
A hierarchy of authentication specifications, Proceedings 10th Computer Security Foundations Workshop, 1997. ,
DOI : 10.1109/CSFW.1997.596782
Demarcation of Security in Authentication Protocols, 2011 First SysSec Workshop, pp.43-50, 2011. ,
DOI : 10.1109/SysSec.2011.13
Secure computation without authentication, pp.361-377, 2005. ,
DOI : 10.1007/11535218_22
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.120.3215
Authentication?myths and misconception. Cryptography and Computational Number Theory, pub, pp.203-225, 2001. ,
DOI : 10.1007/978-3-0348-8295-8_17
Protocols for Authentication and Key Establishment. pub, pp.978-981, 2003. ,
DOI : 10.1007/978-3-662-09527-0
A Quantifier-free First-order Knowledge Logic of Authentication, IOS, 2006. ,
Scyther: Semantics and Verification of Security Protocols. IPA Dissertation Series, 2006. ,
DOI : 10.1007/978-3-540-78636-8
Intensional specifications of security protocols, Proceedings 9th IEEE Computer Security Foundations Workshop, pp.28-38, 1996. ,
DOI : 10.1109/CSFW.1996.503688
Definition of entity authentication, 2010 2nd International Workshop on Security and Communication Networks (IWSCN), pp.1-7, 2010. ,
DOI : 10.1109/IWSCN.2010.5498000
Adaptable authentication model, Proc.: ESSoS, pub. Springer, pp.234-247 ,
Foundations of cryptography: Basic applications, 2004. ,
RFID security and privacy: a research survey, IEEE Journal on Selected Areas in Communications, vol.24, issue.2, pp.381-394, 2006. ,
DOI : 10.1109/JSAC.2005.861395
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.329.6789
New directions in cryptography, IEEE Transactions on Information Theory, vol.22, issue.6, pp.644-654, 1976. ,
DOI : 10.1109/TIT.1976.1055638
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.37.9720
Concrete security for entity recognition: The Jane Doe protocol, IndoCrypt, pp.158-171, 2008. ,
OFMC: A symbolic model checker for security protocols, International J. of Information Security, pp.181-208, 2005. ,
DOI : 10.1007/s10207-004-0055-7
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.90.9886
Static validation of security protocols, Journal of Computer Security, vol.13, issue.3, pp.347-390, 2005. ,
DOI : 10.3233/JCS-2005-13302
URL : http://doi.org/10.3233/jcs-2005-13302
Auth-SL - A System for the Specification and Enforcement of Quality-Based Authentication Policies, Proc.: ICICS'07, pp.386-397, 2007. ,
DOI : 10.1007/978-3-540-77048-0_30
Two facets of authentication, Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238), pp.27-32, 1998. ,
DOI : 10.1109/CSFW.1998.683152
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.35.6490
A Formalization of Credit and Responsibility Within the GNDC Schema, Electronic Notes in Theoretical Computer Science, vol.157, issue.3, pp.61-78, 2006. ,
DOI : 10.1016/j.entcs.2005.09.040