4. Eneh, H. A., Singh, H., and Gemikonakli, O.: A three-way authentication framework for
IEEE 802.11b networks, Proceedings of the 4th International Network Conference
INC’04, Plymouth, UK, ISBN 1-84102-125-3, (2004), pp 345-352
5. Eneh, H. A. and Gemikonakli, O., Analysis of security protocols for authentication in
distributed systems, Proceedings of IADIS International Conference on Applied
Computing, IADIS’05, Volume 2, Algarve, Portugal, ISBN 972-99353-6-X, (2005), pp
301-305
6. Gligor, V. D. et al.: Logics for cryptographic protocols – Virtues and limitations,
Proceedings of the 4th IEEE CSFW, (1991), pp 219-226
7. GroB, T.: Security analysis of the SAML Single Sign-on browser/artifact profile,
http//www.acsac.org/, (2003)
8. Harbitter, A. and Menascé, D. A. A methodology for analysing the performance of
authentication protocols, ACM Transaction on Information and System Security, Vol 5,
No. 4, (2002), pp 458-491.
9. Heintze, N. and Tygar, J. D.: A model for secure protocols and their composition, IEEE
Transactions on Software Engineering, 22(1), (1996), pp 16-30.
10. Hodges, J. and Wason, T.: Liberty architecture overview,
http://www.projectliberty.org/specs/
11. Hughes, J and Maler, E.: Technical overview of the OASIS Security Assertion Markup
Language (SAML) V1.1, Draft 03, http://www.oasis-open.org/committees, (2004)
12. Kohl, J. and Neuman, B. C.: The Kerberos network authentication service (Version 5),
Internet Request for Comments RFC 1510., (1993)
13. Lampson, B. et al.: Authentication in distributed systems: Theory and Practice, ACM
Transactions on Computer Systems, 10(4), (1992), 265-310.
14. Lowe, G.: An attack on the Needham-Schroeder public-key authentication protocol,
Information Processing Letters, 56, (1995), 131-133.
15. Lowe, G.: A hierarchy of authentication specifications, Proceedings of the 10th Computer
Security Foundations Workshop, (CSFW ’97), 1063-6900/97, (1997)
16. Mao, W. and Boyd, C.: Towards formal analysis of security protocols, Proceedings of
Computer Security Foundation Workshop VI, (1993), pp 147-158.
17. Meadows, C.: Extending formal cryptographic protocol analysis techniques for group
protocols and low level cryptographic primitives, Proceedings of the 1st Workshop on
Issues in the Theory of Security, Geneva, (2000), pp 87-92.
18. Meadows, C.: Applying formal methods to the analysis of a key management protocol,
Journal of Computer Security, 1(1), (1992), pp 5-35.
19. Mishra, P.: Bindings and protocols for the OASIS security assertions markup language
(SAML), http://www.oasis-open.org/committees/security/, (2002)
20. Needham, R. and Schroeder, M.: Using encryption for authentication in large network of
computers. Communications of the ACM, 21(12), (1978), pp 993-999.
21. Neuman, B. and Ts’o, T.: Kerberos: An authentication service for computer networks,
32(9), (1994) pp 33-38.
22. OASIS: Authentication Context for the OASIS Security Assertion Markup Language,
(2004)
23. Rubin, A. D. and Honeyman, P.: Formal methods for the analysis of authentication
protocols, Technical Report, CITI TR 93 – 7, (1993)
24. Stallings, W.: Cryptography and network security: Principles and practices, Third Edition,
Prentice Hall, New Jersey, (2002)
30