Post-Session Authentication

Conference object English OPEN
Ahmed , Naveed; Jensen , Christian ,;
  • Publisher: Springer
  • Related identifiers: doi: 10.1007/978-3-642-29852-3_8
  • Subject: [ INFO ] Computer Science [cs]

Part 1: Full Papers; International audience; Entity authentication provides confidence in the claimed identity of a peer entity, but the manner in which this goal is achieved results in different types of authentication. An important factor in this regard is the order b... View more
  • References (10)

    1. Zimmermann, P.R.: Pgpfone: Pretty good privacy phone owner's manual, version 1.0(5),, 1996

    2. ISO standard: Entity Authentication Mechanisms; Part 1: General Model. ISO/IEC 9798-1, Second Edition, September 1991

    3. Stajano, F., Anderson, R.: The Cocaine Auction Protocol: On the Power of Anonymous Broadcast. Information Hiding, pp.434-447, pub. Springer, 2000

    4. Burrows, M. and Abadi, M. and Needham, R.M.: A logic of Authentication. DEC System Research Center, Report 39, revised Feb 22, 1990

    5. Bellare, M. and Rogaway, P.: Entity authentication and key distribution. Crypto'93, pp.232-249, Springer-Verlag LNCS, Vol 773, 1993

    6. Syverson, P.F. and Van Oorschot, P.C.: On Unifying Some Cryptographic Protocol Logics. In Proc.: S&P, pub. IEEE, ISSN:1063-7109, 1994

    7. Gollmann D.: What do we mean by entity authentication?. In Proc.: Symposium on Security and Privacy, pub. IEEE, pp.46-54, 1996

    8. Lowe, G.: A Hierarchy of Authentication Specifications. In Proc.: 10th Computer Security Foundations Workshop (CSFW '97), 1997

    9. Ahmed, N. and Jensen, C.D.: Demarcation of Security in Authentication Protocols. In Proc.: 1st SysSec Workshop, pub. IEEE Computer Society, pp. 43-50, 2011

    10. Barak, B., Canetti, R., Lindell, Y., Pass, R., and Rabin, T.: Secure computation without authentication. In: CRYPTO, pp.361-377, pub. Springer, 2005

  • Related Organizations (3)
  • Metrics
Share - Bookmark