A resilient access control scheme for secure electronic transactions
WOEC'98 Proceedings of the 3rd conference on USENIX Workshop on Electronic Commerce - Volume 3
SLEDE: lightweight verification of sensor network security protocol implementations
Proceedings of the the 6th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering
Models and Proofs of Protocol Security: A Progress Report
CAV '09 Proceedings of the 21st International Conference on Computer Aided Verification
An extended model of rational exchange based on dynamic games of imperfect information
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
Key establishment protocols for secure mobile communications: a critical survey
Computer Communications
Hi-index | 0.00 |
The systematic study of security protocols started, as far as the public literature is concerned, almost 20 years ago. A paper by M.D. Schroeder and the present writer may be taken as a specimen; it was written in 1977 and published in 1978. It was, of course, written against the background of the technology of the time and made various assumptions about the organizational context in which its techniques would be used. The substantial research literature that has since appeared has, by and large, made similar assumptions about the technological organizational environments. Those environments have in fact changed very considerably, and the purpose of this article is to consider whether the changes should affect our approach to security problems. It turns out that where confidentiality is concerned, as distinct from authenticity and integrity, there is indeed a new range of options