— Despite the popularity of VoIP these days, this method of communication may present significant security challenges in terms of privacy and accounting. Authentication and messa...
This paper continues the program initiated in [5], towards a derivation system for security protocols. The general idea is that complex protocols can be formally derived, starting...
Anupam Datta, Ante Derek, John C. Mitchell, Dusko ...
Intelligent security protocols can verify whether the involved principals have properties that are defined based on certain functional and security policies. The property we focu...
We propose a development method for security protocols based on stepwise refinement. Our refinement strategy guides sformation of abstract security goals into protocols that are s...
We present a provably secure tree based authenticated group key agreement protocol in dynamic scenario. Bilinear pairing and multi-signature are at the heart of our protocol. We p...