Skip to search formSkip to main contentSkip to account menu

Needham–Schroeder protocol

Known as: Needham Schroeder, Needham, Needham–Schroeder–Lowe protocol 
The term Needham–Schroeder protocol can refer to one of the two key transport protocols intended for use over an insecure network, both proposed by… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2011
2011
Due to rapid development in the field of communication technologies, security has become a major issue in transformation level… 
2010
2010
Currently, formal methods are the mainstream methods of cryptographic protocol analysis. Typically, these most used approaches… 
Highly Cited
2008
Highly Cited
2008
SCHROEDER, BASTIAN JONATHAN. A Behavior-Based Methodology for Evaluating Pedestrian-Vehicle Interaction at Crosswalks. (Under the… 
2006
2006
This paper researches on Needham-Schroeder protocol with shared keys.It points out bugs and leaks that the protocol exists,and… 
Highly Cited
1999
Highly Cited
1999
have enlightened a large array of ion channels with highly divergent properties. These channels are present in various Plant ion… 
Highly Cited
1996
Highly Cited
1996
Recent analyses of avian leks have come to conflicting conclusions concerning the role of male settlement on female traffic… 
Highly Cited
1990
Highly Cited
1990
A method is described for segmenting edge data into a combination of straight lines and elliptic arcs. The two-stage process… 
Highly Cited
1974
Highly Cited
1974
The seed influences rate of growth, size, shape and maturation of avocado fruits. Seeded fruits are 8-10 times larger than… 
Highly Cited
1967
Highly Cited
1967
Two types of self-synchronizing digital data scramblers and descramblers are introduced and examined. The descramblers recover…