Some definitions, protocols and proofs about secure authentication

  • Authors:
  • Charles Rackoff

  • Affiliations:
  • University of Toronto

  • Venue:
  • CASCON '92 Proceedings of the 1992 conference of the Centre for Advanced Studies on Collaborative research - Volume 2
  • Year:
  • 1992

Quantified Score

Hi-index 0.00

Visualization

Abstract

We illustrate the "computational complexity" approach towards defining the goals of security protocols, and proving protocols meet those goals.