Sciweavers

ACISP
2004
Springer

Protocols with Security Proofs for Mobile Applications

14 years 6 months ago
Protocols with Security Proofs for Mobile Applications
The Canetti-Krawczyk (CK) model is useful for building reusable components that lead to rapid development of secure protocols, especially for engineers working outside of the security community. We work in the CK model and obtain a new secure authenticated key transport protocol with three parties. This protocol is constructed with two newly developed components in the CK model, thus extending the power of the model.
Yiu Shing Terry Tin, Harikrishna Vasanta, Colin Bo
Added 30 Jun 2010
Updated 30 Jun 2010
Type Conference
Year 2004
Where ACISP
Authors Yiu Shing Terry Tin, Harikrishna Vasanta, Colin Boyd, Juan Manuel González Nieto
Comments (0)