Needham–Schroeder protocol

Known as: Needham Schroeder, Needham–Schroeder–Lowe protocol, Needham-Schroeder protocol 
The term Needham–Schroeder protocol can refer to one of the two key transport protocols intended for use over an insecure network, both proposed by… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1994-2016
051019942016

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
Due to rapid development in the field of communication technologies, security has become a major issue in transformation level… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • table 3
Is this relevant?
2010
2010
Currently, formal methods are the mainstream methods of cryptographic protocol analysis. Typically, these most used approaches… (More)
  • figure 1
  • figure 3
  • figure 4
Is this relevant?
2009
2009
A key distribution procedure is an essential constituent of secured exchange of information between the participants. In this… (More)
  • table II
Is this relevant?
Highly Cited
1999
Highly Cited
1999
A strand is a sequence of events; it represents either an execution by a legitimate party in a security protocol or else a… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1998
Highly Cited
1998
Informal arguments that cryptographic protocols are secure can be made rigorous using inductive definitions. The approach is… (More)
  • figure 4
Is this relevant?
Highly Cited
1998
Highly Cited
1998
A strand is a sequence of events; it represents either the execution of legitimate party in a security protocol or else a… (More)
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
1997
Highly Cited
1997
A methodology is presented for using a general-purpose state enumeration tool, Mur', to analyze cryptographic and security… (More)
Is this relevant?
Highly Cited
1997
Highly Cited
1997
This paper presents a general approach for analysis and veri cation of authentication properties in the language of Communicating… (More)
Is this relevant?
Highly Cited
1996
Highly Cited
1996
In this paper we analyse the well known Needham-Schroeder Public-Key Protocol using FDR, a reenement checker for CSP. We use FDR… (More)
Is this relevant?
Highly Cited
1995
Highly Cited
1995
In this paper we present an attack upon the Needham Schroeder public key authentication protocol The attack allows an intruder to… (More)
Is this relevant?