Using encryption for authentication in large networks of computers
Communications of the ACM
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Security of Internet Location Management
ACSAC '02 Proceedings of the 18th Annual Computer Security Applications Conference
Traversing middleboxes with the host identity protocol
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Authentication by correspondence
IEEE Journal on Selected Areas in Communications
Discrete Applied Mathematics
Design and analysis of a generalized canvas protocol
WISTP'10 Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices
Hi-index | 0.00 |
For protocol analysis, we have to capture the protocol specification, the security goals of the protocol, and the communications environment it is expected to run in. In the research literature, the emphasis is usually on verification techniques and on the modelling of security properties, while in most cases the default for the communications environment is an unstructured network totally controlled by the attacker. This paper will argue that for the analysis of the kind of protocols developed today, more specific models of the communications network are required. To support this argument, a number of recently proposed security protocols with novel features will be briefly discussed.