Up: Providing authentication to messages
Previous: Providing authentication to messages
We would like to express out gratitute towards the other members of
the PASTA project.
Funding has been received from the Royal Norwegian Research Council
through the GDD project (project no. 112577/431).
- 1
-
M. Abadi, M. Burrows, C. Kaufman, and B. Lampson.
Authentication and delegation with smart-cards.
Science of Computer Programming, 21(2):93-113, October 1993.
- 2
-
M. Burrows, M. Abadi, and R. Needham.
A Logic of Authentication.
ACM Transactions on Computer Systems, 8(1):18-36, February
1990.
- 3
-
Henry Dreifus and Thomas Monk.
Smart Cards - A Guide to Building and Managing Smart Card
Applications.
IEEE Computer Press, 1997.
ISBN 0-471-15748-1.
- 4
-
H. Gobioff, S. Smith, J. D. Tygar, and B. Yee.
Smart Cards in Hostile Environments.
In Proceedings of the Second USENIX Workshop on Electronic
Commerce, Oakland, CA, November 1996.
- 5
-
David. Kahn.
The Codebreakers: The story of secret writing.
Macmillan Publishing Company, New York, USA, 1967.
- 6
-
B. Lampson, M. Abadi, M. Burrows, and E. Wobber.
Authentication in Distributed Systems: Theory and Practice.
ACM Transactions on Computer Systems, 10(4):265-310, November
1992.
- 7
-
A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone.
Handbook of Applied Cryptography.
CRC Press, Inc., 1997.
ISBN 0-8493-8523-7.
- 8
-
R. L. Rivest.
RFC 1321: The MD5 Message-Digest Algorithm, April 1992.
- 9
-
C. E. Shannon.
Communication theory of secrecy systems.
Bell System Technical Journal, 28:656-715, October 1949.
- 10
-
G. J. Simmons, editor.
Contemporary Cryptology: The Science of Information Integrity.
IEEE Press, 1992.
ISBN 0-87942-277-7.
- 11
-
Douglas R. Stinson.
Cryptography: Theory and Practice.
CRC Press, Inc., 1995.
ISBN 0-8493-8521-0.
- 12
-
Sun Microsystems, Inc.
Java Card 2.0 Language Subset and Virtual Machine Specification.
Revision 1.0 Final, October 1997.
- 13
-
US Department of Defence.
Trusted Computer System Evaluation Criteria, 1985.
DOD 5200.28-STD.
- 14
-
B. Yee and D. Tygar.
Secure Coprocessors in Electronic Commerce Applications.
In Proceedings of The First USENIX Workshop on Electronic
Commerce, New York, New York, July 1995.
Providing authentication to messages signed with
a smart card in hostile environments
This document was generated using the
LaTeX2HTML translator Version 98.1p1 release (March 2nd, 1998)
Copyright © 1993, 1994, 1995, 1996, 1997,
Nikos Drakos,
Computer Based Learning Unit, University of Leeds.
The command line arguments were:
latex2html -dir html -local_icons -split 0 kort.tex.
The translation was initiated by Per Harald Myrvang on 1999-03-23
Per Harald Myrvang
1999-03-23