• Publications
  • Influence
A logic of authentication
TLDR
This paper describes the beliefs of trustworthy parties involved in authentication protocols and the evolution of these beliefs as a consequence of communication, and gives the results of the analysis of four published protocols.
Using encryption for authentication in large networks of computers
Use of encryption to achieve authenticated communication in computer networks is discussed. Example protocols are presented for the establishment of authenticated connections, for the management of
A logic of authentication
TLDR
This paper describes the beliefs of trustworthy parties involved in authentication protocols and the evolution of these beliefs as a consequence of communication, and gives the results of the analysis of four published protocols.
Autonet: A High-Speed, Self-Configuring Local Area Network Using Point-to-Point Links
A sizing gage for use with an LVDT probe for producing an output signal representing the deviation of part dimension from a nominally ideal dimension, and a columnar display means comprising
TEA, a Tiny Encryption Algorithm
We give a short routine which is based on a Feistel iteration and uses a large number of rounds to get security with simplicity.
Reasoning about belief in cryptographic protocols
TLDR
A mechanism is presented for reasoning about belief as a systematic way to understand the working of cryptographic protocols and places a strong emphasis on the separation between the content and the meaning of messages.
Prudent Engineering Practice for Cryptographic Protocols
TLDR
The principles are informal guidelines that complement formal methods, but do not assume them, and are however helpful, in that adherence to them would have avoided a considerable number of published errors.
Prudent engineering practice for cryptographic protocols
  • M. Abadi, R. Needham
  • Computer Science, Mathematics
    Proceedings of IEEE Computer Society Symposium…
  • 1994
We present principles for the design of cryptographic protocols. The principles are neither necessary nor sufficient for correctness. They are however helpful, in that adherence to them would have
Protecting Poorly Chosen Secrets from Guessing Attacks
TLDR
The basic idea is to ensure that data available to the attacker is sufficiently unpredictable to prevent an offline verification of whether a guess is successful or not and to examine protocols to detect vulnerabilities to such attacks.
On the duality of operating system structures
TLDR
It is demonstrated that these two categories are duals of each other and that a system which is constructed according to one model has a direct counterpart in the other, and the principal conclusion is that neither model is inherently preferable.
...
1
2
3
4
5
...