Cryptographic security of reactive systems: (Extended abstract)
Birgit Pfitzmann, Matthias Schunter, et al.
Electronic Notes in Theoretical Computer Science
The Liberty-enabled client and proxy (LECP) protocol's profile is discussed. The LECP protocol is essentially a three-party authentication and channel-establishment in the standard setting of protocols such as Needham-Schroeder or Kerberos, in which all three parties run specific protocol engines. The main advantage of channel-based protocols is that they work with secure sockets layer (SSL) or transport-layer security (TLS), the only current ubiquitous cryptographic infrastructure. Several concerns disappear with an enabled client, as in the LECP protocol, if the operational and user-interface aspects are well designed.
Birgit Pfitzmann, Matthias Schunter, et al.
Electronic Notes in Theoretical Computer Science
Michael Backes, Birgit Pfitzmann, et al.
Journal of Computer Security
Mihir Bellare, Juan A. Garay, et al.
IEEE Journal on Selected Areas in Communications
Michael Backes, Birgit Pfitzmann, et al.
Information and Computation