Problem areas for the IP security protocols
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
A Formal Analysis of Complex Type Flaw Attacks on Security Protocols
AMAST 2008 Proceedings of the 12th international conference on Algebraic Methodology and Software Technology
Hi-index | 0.00 |
We present a design method for message integrity protection.We illustrate the use of the method by designing large classesof message types whose integrity is provably preserved and byapplying the method to the symmetric key option of thePrivacy-enhanced Electronic Mail protocol to help discoverand eliminate an integrity vulnerability