A Formal Model for Systematic Design of Key Establishment Protocols
نویسنده
چکیده
p. 1 The Security of Public Key Cryptosystems Based on Integer Factorization p. 9 A Uniform Approach to Securing Unix Applications Using SESAME p. 24 Integrated Management of Network and Host Based Security Mechanisms p. 36 Covert Distributed Computing Using Java Through Web Spoofing p. 48 Differential Cryptanalysis of a Block Cipher p. 58 On Private-Key Cryptosystems Based on Product Codes p. 68 Key Schedules of Iterative Block Ciphers p. 80 Low-Cost Secure Server Connection with Limited-Privilege Clients p. 90 A Solution to Open Standard of PKI p. 99 Comparison of Commitment Schemes Used in Mix-Mediated Anonymous Communication for Preventing Pool-Mode Attacks p. 111
منابع مشابه
A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving
In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...
متن کاملKey Establishment Protocols and Timed-Release Encryption Schemes
This thesis is divided into two distinct parts. The first part of the thesis explores security issues in key establishment protocols, including both key distribution protocols and key agreement protocols, and in both the general and the password-based setting. The second part of the thesis explores security issues of Timed-Release encryption schemes, especially those with a Pre-Open capability....
متن کاملProtocol Engineering for Protection against Denial-of-Service Attacks
Denial-of-service attacks (DoS) and distributed denial-of-service attacks (DDoS) attempt to temporarily disrupt users or computer resources to cause service unavailability to legitimate users in the internetworking system. The most common type of DoS attack occurs when adversaries flood a large amount of bogus data to interfere or disrupt the service on the server. The attack can be either a si...
متن کاملEffective strategies for the establishment of integration model for succession planning and career progression path of iranian azad universities administrators (Qualitative Research Based Grounded Theory Approach)
• AbstractThis research was done to provide effective strategies for the establishment of integration model for succession planning and career progression path of azad universities administrators from the perspective of higher education administrators and professionals based on the systematic theoretical design of Strauss and Corbin grounded theory. Accordingly, using a targeted sampling method...
متن کاملDesign of Secure Key Establishment Protocols: Successes, Failures and Prospects
Key establishment protocols form one of the most basic types of cryptographic protocols and have been studied intensively for over 20 years. The current status of design and analysis methods is reviewed with particular reference to formal appoaches. Likely future trends and open issues are also discussed.
متن کامل