Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Key agreements based on function composition
Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Using encryption for authentication in large networks of computers
Communications of the ACM
Analyzing Encryption Protocols Using Formal Verification Authentication Schemes
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
Multiuser cryptographic techniques
AFIPS '76 Proceedings of the June 7-10, 1976, national computer conference and exposition
Introducing trusted third parties to the mobile agent paradigm
Secure Internet programming
An Analysis of Integrity Services in Protocols
INDOCRYPT '01 Proceedings of the Second International Conference on Cryptology in India: Progress in Cryptology
State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography - Revised Lectures
On reduction of bootstrapping information using digital multisignature
CIT'04 Proceedings of the 7th international conference on Intelligent Information Technology
Hi-index | 0.00 |
We define a formal language whose symbols are security goals and mechanisms. This allows us to express every security architecture as a string. Designing a security architecture becomes the task of generating a word in the language. Analysing a security architecture becomes the task of parsing a string and determining if it belongs to the language. Since not every complete security architecture achieves its goals equally efficient, we associate a complexity parameter to every goal and mechanism. This allows us to identify complexity- reducing and complexity-increasing mechanisms.