Skip to main content

2004 | OriginalPaper | Buchkapitel

Protocols with Security Proofs for Mobile Applications

verfasst von : Yiu Shing Terry Tin, Harikrishna Vasanta, Colin Boyd, Juan Manuel González Nieto

Erschienen in: Information Security and Privacy

Verlag: Springer Berlin Heidelberg

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

The Canetti-Krawczyk (CK) model is useful for building reusable components that lead to rapid development of secure protocols, especially for engineers working outside of the security community. We work in the CK model and obtain a new secure authenticated key transport protocol with three parties. This protocol is constructed with two newly developed components in the CK model, thus extending the power of the model.

Metadaten
Titel
Protocols with Security Proofs for Mobile Applications
verfasst von
Yiu Shing Terry Tin
Harikrishna Vasanta
Colin Boyd
Juan Manuel González Nieto
Copyright-Jahr
2004
Verlag
Springer Berlin Heidelberg
DOI
https://doi.org/10.1007/978-3-540-27800-9_31

Premium Partner