15.08.2012 Views

CONTENTS - Emerald

CONTENTS - Emerald

CONTENTS - Emerald

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

041407 `Design and Analysis of Key Exchange Protocols via Secure Channel<br />

Identi cation'<br />

CBoyd, WB Mao, Asiacrypt 94 pp 149{159<br />

The authors suggest a new approachtoverifying cryptographic protocols; each public<br />

key encryption operation creates a channel with either con dentiality orintegrity.<br />

By writing these as arrows and diagram chasing, it can be seen for example that the<br />

TMN protocol is awed.<br />

041408 `Designing Secure Key Exchange Protocols'<br />

CBoyd, WB Mao, ESORICS 94 pp 93{105<br />

The authors present a new protocol formalism which is designed to assist the designer<br />

in determining the functional requirements and then translating these into a<br />

veri ed design.<br />

041409 `Formal Methods reality Check: Industrial Usage'<br />

D Craigen, S Gerhart, T Ralston, IEEE Transactions on Software Engineering v 21 no<br />

2(Feb 95) pp 90{98<br />

The authors survey twelve cases of the industrial use of formal methods. These<br />

include a rewall and a smartcard system, as well as a number of transport projects<br />

and software products.<br />

041410 `Probabilistic Authentication Analysis'<br />

J Domingo-Ferrer, Cardis 94 pp 49{59<br />

The author describes a version of the BAN logic in which initial beliefs have probabilities<br />

not equal to 0 or 1. Rules for combining probabilities are given, and it is<br />

claimed that this approach can help measure the e ciency of cryptographic protocols.<br />

041411 `A Ket Distribution Method for Object-Based Protection'<br />

WFord, MJ Wiener, Fairfax 94 pp 193{197<br />

The authors discuss various ways in which cryptographic keys can be bound into<br />

access control blocks for use in distributed systems, especially of the object oriented<br />

variety.<br />

041412 `New Protocols for Third-Party-Based Authentication and Secure<br />

Broadcast'<br />

L Gong, Fairfax 94 pp 176{183<br />

The author presents a number of authentication protocols which use hash functions<br />

and Shamir's secret sharing scheme instead of conventional block encryption. The basic<br />

idea is that a server who shares di erent secrets with Alice and Bob can construct some<br />

numbers using nonces supplied by them which enable each of them to extract a secret<br />

key using polynomial interpolation.<br />

041413 `IRC and Security |Can the Two Co-exist?'<br />

S Gordon, Network Security (Oct 94) pp 10{17<br />

This article explains the Internet Relay Chat protocol and describes some of the<br />

ways it can be exploited or attacked, including netsplits, robot sessions, collisions,<br />

oods and the commoner Trojans.<br />

041414 `Nothing is the Key to the Future'<br />

W Hancock, Network Security (Oct 94) pp 8{9<br />

A large number of communications protocols are now having to be reengineered<br />

to provide more namespace, since no-one thought that networks would grow as fast as<br />

they did. This creates a lot of opportunities for chaos and disruption.<br />

041415 `Beacon Based Authentication'<br />

A Jiwa, J Seberry, YL Zheng, ESORICS 94 pp 125{141<br />

The authors develop an idea of Rabin's for a beacon, a service which continually<br />

broadcasts certi ed nonces, and shows that it can be used to simplify authentication<br />

27

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!