enter search term and/or author name
JFK is a recent, attractive protocol for fast key establishment as part of securing IP communication. In this paper, we formally analyze this protocol in the applied pi calculus (partly in terms of observational equivalences and partly with the...
Provably secure authenticated group Diffie-Hellman key exchange
Emmanuel Bresson, Olivier Chevassut, David Pointcheval
Article No.: 10
Authenticated key-exchange protocols allow two participants A and B, communicating over a public network and each holding an authentication means to exchange a shared secret value. Methods designed to deal with this cryptographic...
On interdomain routing security and pretty secure BGP (psBGP)
P.C. van Oorschot, Tao Wan, Evangelos Kranakis
Article No.: 11
It is well known that the Border Gateway Protocol (BGP), the IETF standard interdomain routing protocol, is vulnerable to a variety of attacks, and that a single misconfigured or malicious BGP speaker could result in large-scale service...
Trust negotiation is a promising approach for establishing trust in open systems, in which sensitive interactions may often occur between entities with no prior knowledge of each other. Although, to date several trust negotiation systems have been...