1. R Bird, I Gopal, A Herzberg, P Janson, S Kutten, R Molva, M Yung. Systematic design of a family of attack-resistant authenticationprotocols. IEEE J Selected Areas in Communications, 1993, 11 (5) :679一6932. D Denning, G Sacco. Timestamps in key distribution protocols. Commun ACM, 1981,24(8) :533^5363. W Diffie, P porschot, M Wiener. Authentication and authehticated key exchanges. Design, Codes and Cryptography. Kluwer Academic Publishers:1992.2,107一1254. ISO CD 9798-2, Information Technology-Security techniques-Entity authentication mechahisms, Part 2:Entity authentication using symmetric techniques,June 19905. R M Needham, M D Schroeder. Using encryption for authentication in large networks of computers. Commun ACM, 1978, 21(12) :993^9996. ISO 9798-2(2nd edition),Information Technology-Security technigues-Entity authentication mechanisms, Part 2:Entity authentication using symmetric techniques, 19997. R Molva, G Tsudik, E V Herreweghen, S Zatti. KryptoKnight authentication and key distribution system. In: Proceedings of ESO-RICS'92,1992,155一1748. M Bellare, P Rogaway. Entity authentication and key distribution. In: Advances in Cryptology-CRYPTO'93 Proceedings, Springer-Verlag.9. ISO CD 10202-5,Financial Transaction Cards-Security architecture of financial systems using integrated circuit cards:Part 5:Use of Algorithms, June 1993 |