CONTENTS - Emerald
CONTENTS - Emerald
CONTENTS - Emerald
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
041407 `Design and Analysis of Key Exchange Protocols via Secure Channel<br />
Identi cation'<br />
CBoyd, WB Mao, Asiacrypt 94 pp 149{159<br />
The authors suggest a new approachtoverifying cryptographic protocols; each public<br />
key encryption operation creates a channel with either con dentiality orintegrity.<br />
By writing these as arrows and diagram chasing, it can be seen for example that the<br />
TMN protocol is awed.<br />
041408 `Designing Secure Key Exchange Protocols'<br />
CBoyd, WB Mao, ESORICS 94 pp 93{105<br />
The authors present a new protocol formalism which is designed to assist the designer<br />
in determining the functional requirements and then translating these into a<br />
veri ed design.<br />
041409 `Formal Methods reality Check: Industrial Usage'<br />
D Craigen, S Gerhart, T Ralston, IEEE Transactions on Software Engineering v 21 no<br />
2(Feb 95) pp 90{98<br />
The authors survey twelve cases of the industrial use of formal methods. These<br />
include a rewall and a smartcard system, as well as a number of transport projects<br />
and software products.<br />
041410 `Probabilistic Authentication Analysis'<br />
J Domingo-Ferrer, Cardis 94 pp 49{59<br />
The author describes a version of the BAN logic in which initial beliefs have probabilities<br />
not equal to 0 or 1. Rules for combining probabilities are given, and it is<br />
claimed that this approach can help measure the e ciency of cryptographic protocols.<br />
041411 `A Ket Distribution Method for Object-Based Protection'<br />
WFord, MJ Wiener, Fairfax 94 pp 193{197<br />
The authors discuss various ways in which cryptographic keys can be bound into<br />
access control blocks for use in distributed systems, especially of the object oriented<br />
variety.<br />
041412 `New Protocols for Third-Party-Based Authentication and Secure<br />
Broadcast'<br />
L Gong, Fairfax 94 pp 176{183<br />
The author presents a number of authentication protocols which use hash functions<br />
and Shamir's secret sharing scheme instead of conventional block encryption. The basic<br />
idea is that a server who shares di erent secrets with Alice and Bob can construct some<br />
numbers using nonces supplied by them which enable each of them to extract a secret<br />
key using polynomial interpolation.<br />
041413 `IRC and Security |Can the Two Co-exist?'<br />
S Gordon, Network Security (Oct 94) pp 10{17<br />
This article explains the Internet Relay Chat protocol and describes some of the<br />
ways it can be exploited or attacked, including netsplits, robot sessions, collisions,<br />
oods and the commoner Trojans.<br />
041414 `Nothing is the Key to the Future'<br />
W Hancock, Network Security (Oct 94) pp 8{9<br />
A large number of communications protocols are now having to be reengineered<br />
to provide more namespace, since no-one thought that networks would grow as fast as<br />
they did. This creates a lot of opportunities for chaos and disruption.<br />
041415 `Beacon Based Authentication'<br />
A Jiwa, J Seberry, YL Zheng, ESORICS 94 pp 125{141<br />
The authors develop an idea of Rabin's for a beacon, a service which continually<br />
broadcasts certi ed nonces, and shows that it can be used to simplify authentication<br />
27