ACM DL

Privacy and Security (TOPS)

Menu

Search Issue
enter search term and/or author name

Archive


ACM Transactions on Information and System Security (TISSEC), Volume 10 Issue 3, July 2007

Just fast keying in the pi calculus
Martín Abadi, Bruno Blanchet, Cédric Fournet
Article No.: 9
DOI: 10.1145/1266977.1266978

JFK is a recent, attractive protocol for fast key establishment as part of securing IP communication. In this paper, we formally analyze this protocol in the applied pi calculus (partly in terms of observational equivalences and partly with the...

Provably secure authenticated group Diffie-Hellman key exchange
Emmanuel Bresson, Olivier Chevassut, David Pointcheval
Article No.: 10
DOI: 10.1145/1266977.1266979

Authenticated key-exchange protocols allow two participants A and B, communicating over a public network and each holding an authentication means to exchange a shared secret value. Methods designed to deal with this cryptographic...

On interdomain routing security and pretty secure BGP (psBGP)
P.C. van Oorschot, Tao Wan, Evangelos Kranakis
Article No.: 11
DOI: 10.1145/1266977.1266980

It is well known that the Border Gateway Protocol (BGP), the IETF standard interdomain routing protocol, is vulnerable to a variety of attacks, and that a single misconfigured or malicious BGP speaker could result in large-scale service...

PP-trust-X: A system for privacy preserving trust negotiations
A. Squicciarini, E. Bertino, Elena Ferrari, F. Paci, B. Thuraisingham
Article No.: 12
DOI: 10.1145/1266977.1266981

Trust negotiation is a promising approach for establishing trust in open systems, in which sensitive interactions may often occur between entities with no prior knowledge of each other. Although, to date several trust negotiation systems have been...