Sciweavers

TCS
2002
14 years 2 days ago
Authentication tests and the structure of bundles
Suppose a principal in a cryptographic protocol creates and transmits a message containing a new value v, later receiving v back in a different cryptographic context. It can concl...
Joshua D. Guttman, F. Javier Thayer
IJNSEC
2008
146views more  IJNSEC 2008»
14 years 13 days ago
Formal Protocol Design of ESIKE Based on Authentication Tests
In this paper, we first present a concrete formal protocol design approach, which is based on authentication tests, to create an Efficient and Secure Internet Key Exchange (ESIKE)...
Rui Jiang, Aiqun Hu, Jianhua Li
ESORICS
2007
Springer
14 years 6 months ago
Completeness of the Authentication Tests
Protocol participants manipulate values, transforming the cryptographic contexts in which they occur. The rules of the protocol determine which transformations are permitted. We fo...
Shaddin F. Doghmi, Joshua D. Guttman, F. Javier Th...