A very simple protocol — the Wide Mouth Frog protocol — allows two agents, A and B, to establish secure communications, using a trusted authentication server, S, and synchronized clocks all around.
The protocol was first described under the name "The Wide-mouthed-frog Protocol" in the paper "A Logic of Authentication" (1990), which introduced Burrows–Abadi–Needham logic, and in which it was an "unpublished protocol ... proposed by" coauthor Michael Burrows.
World Wide Web | wide receiver | Transmission Control Protocol | frog | File Transfer Protocol | Session Initiation Protocol | World Wide Fund for Nature | User Datagram Protocol | BitTorrent (protocol) | Kyoto Protocol | Internet Protocol | Wide World of Sports | Kermit the Frog | Post Office Protocol | Program and System Information Protocol | Simple Network Management Protocol | World Wide Web Consortium | Internet Message Access Protocol | Eyes Wide Shut | Wide World of Sports (U.S. TV series) | Network File System (protocol) | Hypertext Transfer Protocol | Smash Mouth | Mouth of Wilson, Virginia | Lightweight Directory Access Protocol | Secure Real-time Transport Protocol | Real-time Transport Protocol | Wide World of Sports (US TV series) | Wide Receiver | Wide Area Augmentation System |