Authentication by correspondence

被引:9
作者
Gollmann, D [1 ]
机构
[1] Microsoft Res, Cambridge CB3 0FB, England
关键词
correspondence properties; entity authentication; protocol verification;
D O I
10.1109/JSAC.2002.806132
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Correspondence properties capture authentication only indirectly. We trace the origin of correspondence in the analysis of authentication protocols and investigate to what extent correspondence actually corresponds to the various flavors of authentication.
引用
收藏
页码:88 / 95
页数:8
相关论文
共 25 条
[1]  
Abadi Martin, 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.94CH3444-7), P122, DOI 10.1109/RISP.1994.296587
[2]  
[Anonymous], 1996, LNCS
[3]  
BELLARE M, 1994, LECT NOTES COMPUTER, V773, P232
[4]  
BIRD R, 1992, LECT NOTES COMPUT SC, V576, P44
[5]   SYSTEMATIC DESIGN OF A FAMILY OF ATTACK-RESISTANT AUTHENTICATION PROTOCOLS [J].
BIRD, R ;
GOPAL, I ;
HERZBERG, A ;
JANSON, PA ;
KUTTEN, S ;
MOLVA, R ;
YUNG, M .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1993, 11 (05) :679-693
[6]  
Blake-Wilson S, 1997, LECT NOTES COMPUT SC, V1355, P30, DOI 10.1007/BFb0024447
[7]  
Diffie W., 1992, Designs, Codes and Cryptography, V2, P107, DOI 10.1007/BF00124891
[8]   Strand spaces: Why is a security protocol correct? [J].
Fabrega, FJT ;
Herzog, JC ;
Guttman, JD .
1998 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS, 1998, :160-171
[9]   What do we mean by entity authentication? [J].
Gollmann, D .
1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 1996, :46-54
[10]   Authenticity by typing for security protocols [J].
Gordon, AD ;
Jeffrey, A .
14TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2001, :145-159