- 1.M. Abadi and R. Needham. Prudent engineering practice for cryptographic protocols. In Proceedings of the 199j IEEE Symposium on Security and Privacy, pages 122-136, 1994. Google ScholarDigital Library
- 2.C. Boyd. Towards extensional goals in authentication protocols. In Proceedings of the DIMA C$ Workshop on Cryptographic Protocol Design and Verification, 1997.Google Scholar
- 3.M. Burrows, M. Abadi, and R. Needham. A logic of authentication. Technical Report 39, DEC Systems Research Center, February 1990.Google ScholarDigital Library
- 4.D. E. Denning and G. M. Sacco. Timestamps in key distribution protocols. Communications of the ACM, 24(8):533~536, August 1981. Google ScholarDigital Library
- 5.D. Gollmann. What do we mean by entity authentication? In Proceedings of the 1996 IEEE Symposium on Security and Privacy, pages 46- 54, May 1996. Google ScholarDigital Library
- 6.L. Gong. Using one-way functions for authentication. Computer Communication Review, 19(5):8-11, 1989. Google ScholarDigital Library
- 7.L. Gong, R. Needham, and R. Yahalom. Reasoning about belief in cryptographic protocols. In Proceedings of the IEEE Symposium on Security and Privacy, pages 234-248, 1990.Google ScholarCross Ref
- 8.H. M. Hinton. Under-specification, composition and emergent properties. In Proceedings of the 1997 A CM New Security Paradigms Workshop, pages 83-93, 1997. Google ScholarDigital Library
- 9.G. Lowe. An attack on the Needham-Schroder public-key authentication protocol. Information Processing Letters, 56(3):131-133, 1995. Google ScholarDigital Library
- 10.G. Lowe. Breaking and fixing the Needham- Schroeder public-key protocol using FDR. In Tools and Algorithms for the Construction and Analysis of Systems, Lecture Notes in Computer Science 1055, pages 147-166. Springer- Verlag, 1996. Google ScholarCross Ref
- 11.G. Lowe. A hierarchy of authentication specifications. In Proceedings of the l Oth IEEE Computer Security Foundations Workshop, pages 31-43, 1997. Google ScholarDigital Library
- 12.W. Mao and C. Boyd. Classification of cryptographic techniques in authentication protocols. In Selected Areas in Cryptography, pages 95-106, May 1994.Google Scholar
- 13.W. Mao and C. Boyd. Development of authentication protocols: Some misconceptions and a new approach. In Proceedings of the IEEE Computer Security Foundations Workshop, pages 178-186, June 1994.Google Scholar
- 14.W. Mao and C. Boyd. Methodical use of cryptographic transformations in authentication protocols, iEE Proceedings on Computers and Digital Techniques, 142(4), July 1995.Google Scholar
- 15.C. Meadows.Analyzing the Needham- Schroeder public key protocol: A comparison of two approaches.In Proceedings of the European Symposium on Research in Computer Security (ESORICS) 1996, Lecture Notes in Computer Science 1146, pages 351- 364. Springer Verlag, 1996. Google ScholarDigital Library
- 16.C. Meadows. Language generation and verification in the NRL protocol analyzer. In Proceedings of the 1996 Computer Security Foundations Workshop, pages 48-61, June 1996. Google ScholarDigital Library
- 17.J. Millen.CAPSL: Common authentication protocol specification language. http://www.csl.sri.com/- millen/capsl.2 September 1999.Google Scholar
- 18.R. Needham and M. Schroeder. Using en~ cryption for authentication in large networks of computers. Communications of the A CM, 21(12):993-999, December 1978. Google ScholarDigital Library
- 19.S. Schneider. Verifying authentication protocols with CSP. In Proceedings of the l Oth IEEE Computer Security Foundations Workshop, pages 3-17, 1997. Google ScholarDigital Library
- 20.P. F. Syverson and P. C. van Oorschot. On unifying some cryptographic protocol logics. In Proceedings of the 1994 IEEE Symposium on Security and Privacy, May 1994. Google ScholarDigital Library
Index Terms
- Paradigm shifts in protocol analysis
Recommendations
Subclass Graph Embedding and a Marginal Fisher Analysis paradigm
Subspace learning techniques have been extensively used for dimensionality reduction (DR) in many pattern classification problem domains. Recently, methods like Subclass Discriminant Analysis (SDA) and Clustering-based Discriminant Analysis (CDA), which ...
Secure Protocol Transformations
Proceedings, Part II, of the 36th Annual International Cryptology Conference on Advances in Cryptology --- CRYPTO 2016 - Volume 9815In the rich literature of secure multi-party computation MPC, several important results rely on "protocol transformations," whereby protocols from one model of MPC are transformed to protocols from another model. Motivated by the goal of simplifying and ...
Comments