skip to main content
10.1145/335169.335198acmconferencesArticle/Chapter ViewAbstractPublication PagesnspwConference Proceedingsconference-collections
Article
Free Access

Paradigm shifts in protocol analysis

Authors Info & Claims
Published:01 September 1999Publication History
First page image

References

  1. 1.M. Abadi and R. Needham. Prudent engineering practice for cryptographic protocols. In Proceedings of the 199j IEEE Symposium on Security and Privacy, pages 122-136, 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. 2.C. Boyd. Towards extensional goals in authentication protocols. In Proceedings of the DIMA C$ Workshop on Cryptographic Protocol Design and Verification, 1997.Google ScholarGoogle Scholar
  3. 3.M. Burrows, M. Abadi, and R. Needham. A logic of authentication. Technical Report 39, DEC Systems Research Center, February 1990.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. 4.D. E. Denning and G. M. Sacco. Timestamps in key distribution protocols. Communications of the ACM, 24(8):533~536, August 1981. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. 5.D. Gollmann. What do we mean by entity authentication? In Proceedings of the 1996 IEEE Symposium on Security and Privacy, pages 46- 54, May 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. 6.L. Gong. Using one-way functions for authentication. Computer Communication Review, 19(5):8-11, 1989. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. 7.L. Gong, R. Needham, and R. Yahalom. Reasoning about belief in cryptographic protocols. In Proceedings of the IEEE Symposium on Security and Privacy, pages 234-248, 1990.Google ScholarGoogle ScholarCross RefCross Ref
  8. 8.H. M. Hinton. Under-specification, composition and emergent properties. In Proceedings of the 1997 A CM New Security Paradigms Workshop, pages 83-93, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. 9.G. Lowe. An attack on the Needham-Schroder public-key authentication protocol. Information Processing Letters, 56(3):131-133, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. 10.G. Lowe. Breaking and fixing the Needham- Schroeder public-key protocol using FDR. In Tools and Algorithms for the Construction and Analysis of Systems, Lecture Notes in Computer Science 1055, pages 147-166. Springer- Verlag, 1996. Google ScholarGoogle ScholarCross RefCross Ref
  11. 11.G. Lowe. A hierarchy of authentication specifications. In Proceedings of the l Oth IEEE Computer Security Foundations Workshop, pages 31-43, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. 12.W. Mao and C. Boyd. Classification of cryptographic techniques in authentication protocols. In Selected Areas in Cryptography, pages 95-106, May 1994.Google ScholarGoogle Scholar
  13. 13.W. Mao and C. Boyd. Development of authentication protocols: Some misconceptions and a new approach. In Proceedings of the IEEE Computer Security Foundations Workshop, pages 178-186, June 1994.Google ScholarGoogle Scholar
  14. 14.W. Mao and C. Boyd. Methodical use of cryptographic transformations in authentication protocols, iEE Proceedings on Computers and Digital Techniques, 142(4), July 1995.Google ScholarGoogle Scholar
  15. 15.C. Meadows.Analyzing the Needham- Schroeder public key protocol: A comparison of two approaches.In Proceedings of the European Symposium on Research in Computer Security (ESORICS) 1996, Lecture Notes in Computer Science 1146, pages 351- 364. Springer Verlag, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. 16.C. Meadows. Language generation and verification in the NRL protocol analyzer. In Proceedings of the 1996 Computer Security Foundations Workshop, pages 48-61, June 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. 17.J. Millen.CAPSL: Common authentication protocol specification language. http://www.csl.sri.com/- millen/capsl.2 September 1999.Google ScholarGoogle Scholar
  18. 18.R. Needham and M. Schroeder. Using en~ cryption for authentication in large networks of computers. Communications of the A CM, 21(12):993-999, December 1978. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. 19.S. Schneider. Verifying authentication protocols with CSP. In Proceedings of the l Oth IEEE Computer Security Foundations Workshop, pages 3-17, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. 20.P. F. Syverson and P. C. van Oorschot. On unifying some cryptographic protocol logics. In Proceedings of the 1994 IEEE Symposium on Security and Privacy, May 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Paradigm shifts in protocol analysis

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            NSPW '99: Proceedings of the 1999 workshop on New security paradigms
            September 1999
            140 pages
            ISBN:1581131496
            DOI:10.1145/335169

            Copyright © 1999 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 1 September 1999

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • Article

            Acceptance Rates

            Overall Acceptance Rate62of170submissions,36%

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader