Authentication in distributed systems: theory and practice
ACM Transactions on Computer Systems (TOCS)
The inductive approach to verifying cryptographic protocols
Journal of Computer Security
Using encryption for authentication in large networks of computers
Communications of the ACM
Authentication tests and the structure of bundles
Theoretical Computer Science
Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR
TACAs '96 Proceedings of the Second International Workshop on Tools and Algorithms for Construction and Analysis of Systems
Towards Automatic Verification of Authentication Protocols on an Unbounded Network
CSFW '00 Proceedings of the 13th IEEE workshop on Computer Security Foundations
Design of a Role-Based Trust-Management Framework
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
Authentication tests and disjoint encryption: A design method for security protocols
Journal of Computer Security - Special issue on CSFW15
Types and effects for asymmetric cryptographic protocols
Journal of Computer Security - Special issue on CSFW15
Searching for shapes in cryptographic protocols
TACAS'07 Proceedings of the 13th international conference on Tools and algorithms for the construction and analysis of systems
Completeness of the authentication tests
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Hi-index | 0.00 |
When a distributed system may need to operate in the presence of an adversary, when it must support the activities of parties that do not trust one another fully, then cryptographic protocols will play a fundamental role in its design. One example of their importance is their ability to allow principals to agree on keys that will be shared for a session with an authenticated peer. But more fundamentally, a cryptographic protocol is a mechanism to achieve agreement among specific sets of peers, whether on keys or other values. Thus, they can play a fundamental role in organizing transactions in distributed systems, and coordinating interactions among principals.