Efficient and timely mutual authentication
ACM SIGOPS Operating Systems Review
Strand spaces: proving security protocols correct
Journal of Computer Security
Constraint solving for bounded-process cryptographic protocol analysis
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
The Logic of Authentication Protocols
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Systematic Design of Two-Party Authentication Protocols
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
A Formal Framework and Evaluation Method for Network Denial of Service
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
A Formal Analysis of Syverson's Rational Exchange Protocol
CSFW '02 Proceedings of the 15th IEEE workshop on Computer Security Foundations
The many faces of publish/subscribe
ACM Computing Surveys (CSUR)
A Semantic Model for Authentication Protocols
SP '93 Proceedings of the 1993 IEEE Symposium on Security and Privacy
On the semantics of Alice&Bob specifications of security protocols
Theoretical Computer Science - Automated reasoning for security protocol analysis
Scalable Protocols for Authenticated Group Key Exchange
Journal of Cryptology
Algorithmic Game Theory
FPGA Design of Self-certified Signature Verification on Koblitz Curves
CHES '07 Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems
Concast: design and implementation of an active network service
IEEE Journal on Selected Areas in Communications
Proceedings of the 4th International Conference on PErvasive Technologies Related to Assistive Environments
Towards a cryptographic treatment of publish/subscribe systems
Journal of Computer Security
Hi-index | 0.00 |
In this paper, we pursue towards understanding how to design and analyse cryptographic protocols in a (large) network setting where all communication is solely based on the publish/subscribe paradigm. That is, we expect a stack and network architecture where all message passing is based on publish/subscribe rather than send/receive, all the way down to the link layer. Under those assumptions, it looks like that the majority of present work on cryptographic protocol analysis applies to an extent, with only minor modifications mostly on the notation side, while the protocol design aspects will need larger modifications. Furthermore, the paradigm shift opens a number of interesting problems, requiring modifications to many of the traditional intuitions guiding protocol design and analysis.