Authentication metric analysis and design
ACM Transactions on Information and System Security (TISSEC)
Secrecy by typing in security protocols
Journal of the ACM (JACM)
Some guidelines for non-repudiation protocols
ACM SIGCOMM Computer Communication Review
Security Domains: Key Management in Large-Scale Systems
IEEE Software
The Logic of Authentication Protocols
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Availability of protocol goals
Proceedings of the 2003 ACM symposium on Applied computing
Tailoring the Dolev-Yao abstraction to web services realities
Proceedings of the 2005 workshop on Secure web services
Building blocks for atomicity in electronic commerce
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
Environmental requirements for authentication protocols
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
Security protocols: principles and calculi tutorial notes
Foundations of security analysis and design IV
Hi-index | 0.00 |
Recent papers have taken a new look at cryptographic protocols from the perspective of proposing design principles. For years the main approach to cryptographic protocols has been logical, and a number of papers have examined the limitations of those logics. This paper takes a similar cautionary look at the design principal approach. Limitations and exceptions are offered on some of the previously given basic design principals. The focus is primarily on public key protocols, especially on the order of signature and encryption. But, other principles are discussed as well. Apparently secure protocols that fail to meet principles are presented. Also presented are new attacks on protocols as well as previously claimed attacks which are not.