publication . Conference object . 2012

Post-Session Authentication

Ahmed, Naveed; Jensen, Christian,;
Open Access English
  • Published: 21 May 2012
  • Publisher: Springer
Abstract
Part 1: Full Papers; International audience; Entity authentication provides confidence in the claimed identity of a peer entity, but the manner in which this goal is achieved results in different types of authentication. An important factor in this regard is the order between authentication and the execution of the associated session. In this paper, we consider the case of post-session authentication, where parties authenticate each other at the end of their interactive session. This use of authentication is different from session-less authentication (e.g., in RFID) and pre-session authentication (e.g., for access control.)Post-session authentication, although a...
Subjects
acm: Data_MISCELLANEOUSComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS
free text keywords: [INFO]Computer Science [cs], [ INFO ] Computer Science [cs]

1. Zimmermann, P.R.: Pgpfone: Pretty good privacy phone owner's manual, version 1.0(5), http://web.mit.edu/network/pgpfone/manual/#PGP000057, 1996

2. ISO standard: Entity Authentication Mechanisms; Part 1: General Model. ISO/IEC 9798-1, Second Edition, September 1991

3. Stajano, F., Anderson, R.: The Cocaine Auction Protocol: On the Power of Anonymous Broadcast. Information Hiding, pp.434-447, pub. Springer, 2000

4. Burrows, M. and Abadi, M. and Needham, R.M.: A logic of Authentication. DEC System Research Center, Report 39, revised Feb 22, 1990

5. Bellare, M. and Rogaway, P.: Entity authentication and key distribution. Crypto'93, pp.232-249, Springer-Verlag LNCS, Vol 773, 1993

6. Syverson, P.F. and Van Oorschot, P.C.: On Unifying Some Cryptographic Protocol Logics. In Proc.: S&P, pub. IEEE, ISSN:1063-7109, 1994

7. Gollmann D.: What do we mean by entity authentication?. In Proc.: Symposium on Security and Privacy, pub. IEEE, pp.46-54, 1996

8. Lowe, G.: A Hierarchy of Authentication Specifications. In Proc.: 10th Computer Security Foundations Workshop (CSFW '97), 1997

9. Ahmed, N. and Jensen, C.D.: Demarcation of Security in Authentication Protocols. In Proc.: 1st SysSec Workshop, pub. IEEE Computer Society, pp. 43-50, 2011

10. Barak, B., Canetti, R., Lindell, Y., Pass, R., and Rabin, T.: Secure computation without authentication. In: CRYPTO, pp.361-377, pub. Springer, 2005

Powered by OpenAIRE Open Research Graph
Any information missing or wrong?Report an Issue
publication . Conference object . 2012

Post-Session Authentication

Ahmed, Naveed; Jensen, Christian,;