Authentication logic supporting synchronization, revocation, and recency

  • Stuart G. Stubblebine
  • , Rebecca N. Wright

Research output: Contribution to conferencePaperpeer-review

25 Scopus citations

Abstract

A logic for analyzing cryptographic protocols and has the capability to specify time and synchronization details is presented. Such capability considerably advances the scope of known techniques for both expressing practical authentication policies of protocol participants as constraints, and for reasoning about protocol goals subject to these constraints. The logic is flexible and can support a wide range of security policies. Lastly, the ability to reason about the conjunction of individual participant policies and protocols will be especially important as public and private key infrastructures are deployed and new and unanticipated policies are put into use.

Original languageAmerican English
Pages95-105
Number of pages11
DOIs
StatePublished - 1996
Externally publishedYes
EventProceedings of the 1996 3rd ACM Conference on Computer and Communications Security - New Delhi, India
Duration: Mar 14 1996Mar 16 1996

Other

OtherProceedings of the 1996 3rd ACM Conference on Computer and Communications Security
CityNew Delhi, India
Period3/14/963/16/96

ASJC Scopus subject areas

  • Software
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Authentication logic supporting synchronization, revocation, and recency'. Together they form a unique fingerprint.

Cite this