A semantics for a logic of authentication (extended abstract)
PODC '91 Proceedings of the tenth annual ACM symposium on Principles of distributed computing
Computer Networks and ISDN Systems - Formal description technique (FDT) languages for protocols
On key distribution protocols for repeated authentication
ACM SIGOPS Operating Systems Review
Timestamps in key distribution protocols
Communications of the ACM
Using encryption for authentication in large networks of computers
Communications of the ACM
DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION
DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION
Authentication protocols for personal communication systems
SIGCOMM '95 Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication
The faithfulness of abstract protocol analysis: message authentication
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Authentication tests and the structure of bundles
Theoretical Computer Science
Authentication of Mobile Users in Third Generation Mobile Systems
Wireless Personal Communications: An International Journal
Accelerating Key Establishment Protocols for Mobile Communication
ACISP '99 Proceedings of the 4th Australasian Conference on Information Security and Privacy
Security Goals: Packet Trajectories and Strand Spaces
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Formal verification: an imperative step in the design of security protocols
Computer Networks: The International Journal of Computer and Telecommunications Networking
Analysis of a mobile communication security protocol
ISICT '03 Proceedings of the 1st international symposium on Information and communication technologies
Security protocols for 2G and 3G wireless communications
ISICT '03 Proceedings of the 1st international symposium on Information and communication technologies
Fast automatic synthesis of security protocols using backward search
Proceedings of the 2003 ACM workshop on Formal methods in security engineering
The faithfulness of abstract protocol analysis: message authentication
Journal of Computer Security - Special issue on ACM conference on computer and communications security, 2001
ACM Transactions on Information and System Security (TISSEC)
Static validation of security protocols
Journal of Computer Security
SKMA: a key management architecture for SCADA systems
ACSW Frontiers '06 Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54
The ρ-spi Calculus at Work: Authentication Case Studies
Electronic Notes in Theoretical Computer Science (ENTCS)
A generic security API for symmetric key management on cryptographic devices
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
Efficient key distribution protocol for electronic commerce in mobile communications
PARA'04 Proceedings of the 7th international conference on Applied Parallel Computing: state of the Art in Scientific Computing
Anonymous channel and authentication in wireless communications
Computer Communications
Key establishment protocols for secure mobile communications: a critical survey
Computer Communications
Fast automatic security protocol generation
Journal of Computer Security
Hi-index | 0.00 |
Beller, Chang and Yacobi [2] have recently proposed a set of secret key and public key protocols to meet authentication and privacy requirements for conversation set-up protocols for the initiating party of portable communication systems. This paper improves upon the protocols to obtain a higher assurance of authentication and key distribution. Conversation set-up protocols for the responding party are discussed, a public key protocol providing end-to-end authentication and privacy is described, and relative as well as collective merits of the protocols are emphasised.