{"title":"The Interrogator A Tool for Cryptographic Protocol Security","authors":"J. Millen","doi":"10.1109/SP.1984.10003","DOIUrl":null,"url":null,"abstract":"Computer networks employ encryption several purposes, including private communication, message authentication, and digital signatures. The correctness and security of these applications depend not only on the strength the cryptographic algorithms, but also on the procedures for key management.","PeriodicalId":436003,"journal":{"name":"1984 IEEE Symposium on Security and Privacy","volume":"46 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1984-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"72","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"1984 IEEE Symposium on Security and Privacy","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SP.1984.10003","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 72
Abstract
Computer networks employ encryption several purposes, including private communication, message authentication, and digital signatures. The correctness and security of these applications depend not only on the strength the cryptographic algorithms, but also on the procedures for key management.