Standout Papers

A logic of authentication 1989 2026 2001 2013 378
  1. A logic of authentication (1989)
    Michael T. Burrows, M. Abadi et al. Proceedings of the Royal Society of London A Mathematical and Physical Sciences

Citation Impact

Citing Papers

Dos and don'ts of client authentication on the web
2001
Practical Byzantine fault tolerance
1999 Standout
Static detection of security vulnerabilities in scripting languages
2006 Standout
MulVAL: a logic-based network security analyzer
2005 Standout
End-to-end authorization
2000
Principles of Policy in Secure Groups.
2001
A Secure Authentication Scheme for Telecare Medicine Information Systems
2010 Standout
Lightweight Mutual Authentication and Privacy-Preservation Scheme for Intelligent Wearable Devices in Industrial-CPS
2020
Modeling and Verifying Security Protocols with the Applied Pi Calculus and ProVerif
2016
The Anatomy of the Grid: Enabling Scalable Virtual Organizations
2001 Standout
Rapid Trust Establishment for Pervasive Personal Computing
2007
DART
2005 Standout
A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements
2010 Standout
Ciphertext-Policy Attribute-Based Encryption
2007 Standout
Cryptanalysis of simple three-party key exchange protocol (S-3PAKE)
2008
Language-based information-flow security
2003 Standout
Private authentication
2004
A secure group membership protocol
1996
A Hybrid BlockChain-Based Identity Authentication Scheme for Multi-WSN
2020 Standout
A comprehensive review of big data analytics throughout product lifecycle to support sustainable smart manufacturing: A framework, challenges and future research directions
2018 Standout
The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes
2012 Standout
A Formal Analysis of 5G Authentication
2018 Standout
A survey of Web security
1998
Leveraging personal devices for stronger password authentication from untrusted computers
2011
Privacy-Preserving Schemes for Ad Hoc Social Networks: A Survey
2017
Privacy-preserving data mining
2000 Standout
An attack on the Needham-Schroeder public-key authentication protocol
1995
Information hiding-a survey
1999 Standout
Secrecy types for asymmetric communication
2003
A Secure and Privacy-Preserving Mutual Authentication System for Global Roaming in Mobile Networks
2021
Practical byzantine fault tolerance and proactive recovery
2002 Standout
Design of Secure Mutual Authentication Scheme for Metaverse Environments Using Blockchain
2022 Standout
The Case for VM-Based Cloudlets in Mobile Computing
2009 Standout
Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues
2015 Standout
Behind the definition of Industry 5.0: a systematic review of technologies, principles, components, and values
2023 Standout
TCP Congestion Control
1999 Standout
A Survey on Metaverse: Fundamentals, Security, and Privacy
2022 Standout
seL4
2009 Standout
Crowds
1998 Standout
Lest we remember
2009 Standout
Survey on IoT security: Challenges and solution using machine learning, artificial intelligence and blockchain technology
2020 Standout
IoT Middleware: A Survey on Issues and Enabling technologies
2016
SAFKASI
2000
Terra
2003
Vehicular Networking: A Survey and Tutorial on Requirements, Architectures, Challenges, Standards and Solutions
2011 Standout
A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures
2019 Standout
Why cryptosystems fail
1994
A New Method of Isolation of Isoflavones from Glycine max (Soya Beans) by Complexation Technique
2008
Secrecy by typing in security protocols
1999
Delegation logic
2003
Advances in Copper Complexes as Anticancer Agents
2013 Standout
An Overview of Internet of Things (IoT) and Data Analytics in Agriculture: Benefits and Challenges
2018 Standout
A Calculus for Cryptographic Protocols: The Spi Calculus
1999
An architecture for survivable coordination in large distributed systems
2000
A security architecture for fault-tolerant systems
1994
Provably repairing the ISO/IEC 9798 standard for entity authentication1
2013
A practical soft type system for scheme
1997
Cryptography and evidence
2021
TCP congestion control with a misbehaving receiver
1999
Lightweight protocols and privacy for all-in-silicon objects
2013
Architectural support for copy and tamper resistant software
2000

Works of M. Abadi being referenced

A logic of authentication
1989 Standout
A logic of authentication
1989
Explicit communication revisited: two new attacks on authentication protocols
1997
Prudent engineering practice for cryptographic protocols
1996
Authentication in distributed systems
1992
Dynamic typing in polymorphic languages
1995
Authentication and delegation with smart-cards
1993
Rankless by CCL
2026