Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,741,296 papers from all fields of science
Search
Sign In
Create Free Account
Needham–Schroeder protocol
Known as:
Needham Schroeder
, Needham
, Needham–Schroeder–Lowe protocol
Expand
The term Needham–Schroeder protocol can refer to one of the two key transport protocols intended for use over an insecure network, both proposed by…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
15 relations
Alice and Bob
Authentication
Cryptographic nonce
Dorothy E. Denning
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2011
2011
Secure Communication Using Needham-Schroeder Protocol
Mandeep Kumar
,
Alok Tuli
,
Ruby Tuli
2011
Corpus ID: 13875880
Due to rapid development in the field of communication technologies, security has become a major issue in transformation level…
Expand
2010
2010
Model Checking of Needham-Schroeder Protocol Using UPPAAL
Mei Rong
,
Zhonghui Li
,
Guangquan Zhang
International Conference on Wireless…
2010
Corpus ID: 16346178
Currently, formal methods are the mainstream methods of cryptographic protocol analysis. Typically, these most used approaches…
Expand
Highly Cited
2008
Highly Cited
2008
A Behavior-Based Methodology for Evaluating Pedestrian-Vehicle Interaction at Crosswalks
Bastian Schroeder
2008
Corpus ID: 107012335
SCHROEDER, BASTIAN JONATHAN. A Behavior-Based Methodology for Evaluating Pedestrian-Vehicle Interaction at Crosswalks. (Under the…
Expand
2006
2006
Improvement of Needham-Schroeder Protocol with Shared Keys
He Da-ke
2006
Corpus ID: 57912901
This paper researches on Needham-Schroeder protocol with shared keys.It points out bugs and leaks that the protocol exists,and…
Expand
Highly Cited
1999
Highly Cited
1999
Molecular mechanisms and regulation of plant ion channels
K. Czempinski
,
Nicola Gaedeke
,
S. Zimmermann
,
B. Müller-röber
1999
Corpus ID: 9864294
have enlightened a large array of ion channels with highly divergent properties. These channels are present in various Plant ion…
Expand
Highly Cited
1998
Highly Cited
1998
Gopaul-McNicol, Sharon-ann & Thomas-Presswood, Tania. (1997). Working With Linguistically and Culturally Different Children: Innovative Clinical and Educational Approaches. Needham Heights, MA…
K. Corby
1998
Corpus ID: 148791783
Highly Cited
1996
Highly Cited
1996
A re-evaluation of hotspot settlement in lekking sage grouse
R. Gibson
Animal Behaviour
1996
Corpus ID: 53151689
Recent analyses of avian leks have come to conflicting conclusions concerning the role of male settlement on female traffic…
Expand
Highly Cited
1990
Highly Cited
1990
Segmenting curves into elliptic arcs and straight lines
Paul L. Rosin
,
G. West
[] Proceedings Third International Conference on…
1990
Corpus ID: 36834050
A method is described for segmenting edge data into a combination of straight lines and elliptic arcs. The two-stage process…
Expand
Highly Cited
1974
Highly Cited
1974
Development of Seeded and Seedless Avocado Fruits1
A. Blumenfeld
,
S. Gazit
Journal of the American Society for Horticultural…
1974
Corpus ID: 56472723
The seed influences rate of growth, size, shape and maturation of avocado fruits. Seeded fruits are 8-10 times larger than…
Expand
Highly Cited
1967
Highly Cited
1967
Some simple self-synchronizing digital data scramblers
J. Savage
1967
Corpus ID: 59941652
Two types of self-synchronizing digital data scramblers and descramblers are introduced and examined. The descramblers recover…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE