Online citations, reference lists, and bibliographies.

On The Security Of Public Key Protocols

D. Dolev, A. Yao
Published 1981 · Computer Science

Cite This
Download PDF
Analyze on Scholarcy
Share
Recently the use of public key encryption to provide secure network communication has received considerable attention. Such public key systems are usually effective against passive eavesdroppers, who merely tap the lines and try to decipher the message. It has been pointed out, however, that an improperly designed protocol could be vulnerable to an active saboteur, one who may impersonate another user or alter the message being transmitted. Several models are formulated in which the security of protocols can be discussed precisely. Algorithms and characterizations that can be used to determine protocol security in these models are given.
This paper references



This paper is referenced by
10.4018/978-1-59904-855-0.CH020
Formal Analysis and Design of Authentication Protocols
S. Shaikh (2009)
10.1109/ETFA.2017.8247591
Introducing remote attestation and hardware-based cryptography to OPC UA
Pascal Birnstill (2017)
10.1109/ICMECG.2010.87
Formal Verification of Protocols in E-commerce
Jiafen Liu (2010)
10.1109/JETCAS.2013.2243633
Challenges and Opportunities for Securing Intelligent Transportation System
Meiyuan Zhao (2013)
10.1016/j.procs.2017.06.103
Secure Logging as a Service Using Reversible Watermarking
Abid Khan (2017)
10.1109/ACCESS.2018.2854798
Provably Secure Multi-Server Authentication Protocol Using Fuzzy Commitment
Subhas Barman (2018)
10.1016/j.entcs.2009.06.030
Verification of Correspondence Assertions in a Calculus for Mobile Ad Hoc Networks
Jens Chr. Godskesen (2009)
10.1007/s10916-012-9843-1
Security Analysis of Standards-Driven Communication Protocols for Healthcare Scenarios
Massimiliano Masi (2012)
10.1109/ICOCS.2012.6458584
Vulnerabilities of two recently RFID authentication protocols
Noureddine Chikouche (2012)
10.1109/ACCESS.2018.2884541
Registration Center Based User Authentication Scheme for Smart E-Governance Applications in Smart Cities
Saud S. Alotaibi (2019)
Symbolic Abstractions for Quantum Protocol Verification
Lucca Hirschi (2019)
10.1109/ACCESS.2019.2912998
Provably Secure ECC-Based Device Access Control and Key Agreement Protocol for IoT Environment
A. K. Das (2019)
10.1109/JCN.2019.000051
"Worth one minute": An anonymous rewarding platform for crowd-sensing systems
Lorenz Cuno Klopfenstein (2019)
10.1109/SCCC49216.2019.8966440
On-The-Fly Diffie-Hellman for IoT
J. D'iaz Arancibia (2019)
Relaxed freshness in component authentication
Frank Schuhmacher (2020)
10.1109/TVT.2016.2621354
A Secure and Authenticated Key Management Protocol (SA-KMP) for Vehicular Networks
Hengchuan Tan (2016)
Trust based Privacy Policy Enforcement in Cloud Computing
Karthick Ramachandran (2015)
10.1109/FORMALISE.2015.10
Formal Verification of the Security for Dual Connectivity in LTE
Noamen Ben Henda (2015)
10.1007/978-3-662-48683-2_10
Reconstruction of Potential Attack Scenarios of the OpenID Protocol Towards Network Forensics Analysis
Dongyao Ji (2015)
10.1007/978-3-319-45477-1_6
Formal Analysis of Security Properties on the OPC-UA SCADA Protocol
Maxime Puys (2016)
10.1145/3022227.3022276
Cryptanalysis and improvement of a biometric and smart card based remote user authentication scheme
Chunyi Quan (2017)
10.17512/JAMCM.2015.3.14
TIMED MODELS OF SECURITY PROTOCOLS INCLUDING DELAYS IN THE NETWORK
Sabina Szymoniak (2015)
10.1007/978-3-319-66335-7_8
A Probabilistic Small Model Theorem to Assess Confidentiality of Dispersed Cloud Storage
M. Baldi (2017)
10.18130/V3C85C
A formal semantics for evaluating cryptographic protocols
A. Yasinsac (1996)
10.3233/JIFS-169820
A PKC-based user authentication scheme without smart card
Devender Kumar (2018)
10.1109/TC.2017.2780823
Design, Implementation and Verification of Cloud Architecture for Monitoring a Virtual Machine's Security Health
Tianwei Zhang (2018)
10.1109/ISPS.2018.8379018
Towards privacy and ownership preserving of outsourced health data in IoT-cloud context
Youcef Ould-Yahia (2018)
A Verifiable Language for Cryptographic Protocols
Christoffer Rosenkilde Nielsen (2009)
10.1007/S12083-019-00782-8
New efficient M2C and M2M mutual authentication protocols for IoT-based healthcare applications
Fatma Merabet (2020)
10.1016/j.adhoc.2019.102062
Efficient provably-secure privacy-preserving signature-based key establishment protocol
Dariush Abbasinezhad-Mood (2020)
10.1016/j.cose.2019.101619
Understanding security failures of multi-factor authentication schemes for multi-server environments
Ding Wang (2020)
Synthèse et Compilation de Services Web Sécurisés
Mohammed Anis Mekki (2011)
See more
Semantic Scholar Logo Some data provided by SemanticScholar