scispace - formally typeset
Open Access

A Survey of Authentication Protocol Literature

John A. Clark
About
The article was published on 2010-01-01 and is currently open access. It has received 152 citations till now. The article focuses on the topics: Authentication protocol & Lightweight Extensible Authentication Protocol.

read more

Citations
More filters
Journal ArticleDOI

Automatic verification of correspondences for security protocols

TL;DR: In this paper, the authors present a technique for verifying correspondences in security protocols, which can handle an unbounded number of sessions of the protocol, and it is efficient in practice.
Patent

Dual-interface key management

TL;DR: In this paper, the challenge-response authentication interaction is based at least in part on the stored key-management information, and the device is configured to prevent data in the protected portion of the memory from being modified in response to information received via the first interface.
Book ChapterDOI

Automatic Verification of Privacy Properties in the Applied pi Calculus

TL;DR: This work develops a formal method verification technique for cryptographic protocols that focuses on proving observational equivalences of the kind P ∼ Q, where the processes P and Q have the same structure and differ only in the choice of terms.
Proceedings ArticleDOI

Untraceability of RFID protocols

TL;DR: An intuitive formal definition of untraceability is given of the standard Dolev-Yao intruder model and a previously unknown attack on a publishedRFID protocol is shown and the framework to prove that the protocol is notuntraceable is used.
Book ChapterDOI

Comparing State Spaces in Automatic Security Protocol Analysis

TL;DR: The study of state space relations is applied in a performance comparison of several well-known automatic tools for security protocol analysis, using the same protocol description and exploring the same state space to effectively compare these automatic tools.
References
More filters
Journal ArticleDOI

New Directions in Cryptography

TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Journal ArticleDOI

A method for obtaining digital signatures and public-key cryptosystems

TL;DR: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
Journal ArticleDOI

Using encryption for authentication in large networks of computers

TL;DR: Use of encryption to achieve authenticated communication in computer networks is discussed and example protocols are presented for the establishment of authenticated connections, for the management of authenticated mail, and for signature verification and document integrity guarantee.
Journal ArticleDOI

A logic of authentication

TL;DR: This paper describes the beliefs of trustworthy parties involved in authentication protocols and the evolution of these beliefs as a consequence of communication, and gives the results of the analysis of four published protocols.
Book

Cryptography and data security

TL;DR: The goal of this book is to introduce the mathematical principles of data security and to show how these principles apply to operating systems, database systems, and computer networks.
Related Papers (5)