An attack on the Needham-Schroeder public-key authentication protocol
Information Processing Letters
Using encryption for authentication in large networks of computers
Communications of the ACM
The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols
CAV '08 Proceedings of the 20th international conference on Computer Aided Verification
Hi-index | 0.00 |
This paper describes one of possible implementations of method used for protocol design described in a paper from 1998 by L. Buttyán, S. Staamann and U. Wilhelm which proposes a backward search (regression) when synthesizing an authentication protocol. Furthermore, the approach presented in this paper allows a designer to define participants who are trustworthy enough to transfer information between other two participants without existence of a direct channel to achieve basic routing functionality.