Prudent engineering practice for cryptographic protocols

Roger M. Needham
IEEE Symposium on Security and Privacy (1994), pp. 122-136

Abstract