Private authentication
From MaRDI portal
Publication:1881255
DOI10.1016/j.tcs.2003.12.023zbMath1071.68006OpenAlexW2914971001MaRDI QIDQ1881255
Publication date: 4 October 2004
Published in: Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.tcs.2003.12.023
Data encryption (aspects in computer science) (68P25) Network protocols (68M12) Authentication, digital signatures and secret sharing (94A62)
Related Items (14)
Compositional analysis of protocol equivalence in the applied \(\pi \)-calculus using quasi-open bisimilarity ⋮ Probabilistic and nondeterministic aspects of anonymity ⋮ Theorem-proving anonymity of infinite-state systems ⋮ Stateful applied pi calculus: observational equivalence and labelled bisimilarity ⋮ POR for security protocol equivalences. Beyond action-determinism ⋮ Deciding equivalence-based properties using constraint solving ⋮ When privacy fails, a formula describes an attack: a complete and compositional verification method for the applied \(\pi\)-calculus ⋮ A semantics for web services authentication ⋮ Channel abstractions for network security ⋮ On Communication Models When Verifying Equivalence Properties ⋮ A complete symbolic bisimulation for full applied pi calculus ⋮ Security Abstractions and Intruder Models (Extended Abstract) ⋮ A procedure for deciding symbolic equivalence between sets of constraint systems ⋮ Automated Verification of Equivalence Properties of Cryptographic Protocols
Cites Work
- Probabilistic encryption
- A calculus for cryptographic protocols: The spi calculus
- Secure implementation of channel abstractions
- Designated Verifier Proofs and Their Applications
- Identity-Based Cryptosystems and Signature Schemes
- Using encryption for authentication in large networks of computers
- Authentication primitives and their compilation
- Mobile values, new names, and secure communication
- Cryptographic defense against traffic analysis
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Private authentication