Publication detail

Routing Functionality in the Logic Approach for Authentication Protocol Design

OČENÁŠEK, P. HRANÁČ, J.

Original Title

Routing Functionality in the Logic Approach for Authentication Protocol Design

English Title

Routing Functionality in the Logic Approach for Authentication Protocol Design

Type

conference paper

Language

en

Original Abstract

This paper describes one of possible implementations of method used for protocol design described in a paper from 1998 by L. Buttyán, S. Staamann and U. Wilhelm which proposes a backward search (regression) when synthesizing an authentication protocol. Furthermore, the approach presented in this paper allows a designer to define participants who are trustworthy enough to transfer information between other two participants without existence of a direct channel to achieve basic routing functionality.

English abstract

This paper describes one of possible implementations of method used for protocol design described in a paper from 1998 by L. Buttyán, S. Staamann and U. Wilhelm which proposes a backward search (regression) when synthesizing an authentication protocol. Furthermore, the approach presented in this paper allows a designer to define participants who are trustworthy enough to transfer information between other two participants without existence of a direct channel to achieve basic routing functionality.

Keywords

Logic, Authentication, Key Distribution, Security Protocol, Routing.

RIV year

2011

Released

02.03.2011

Publisher

Springer Verlag

Location

Berlin Heidelberg

ISBN

978-3-642-21792-0

Book

Human Interface and the Management of Information. Interacting with Information

Edition

LNCS 6771

Edition number

NEUVEDEN

Pages from

366

Pages to

373

Pages count

8

BibTex


@inproceedings{BUT76281,
  author="Pavel {Očenášek} and Jakub {Hranáč}",
  title="Routing Functionality in the Logic Approach for Authentication Protocol Design",
  annote="This paper describes one of possible implementations of method used for protocol
design described in a paper from 1998 by L. Buttyán, S. Staamann and U. Wilhelm
which proposes a backward search (regression) when synthesizing an authentication
protocol. Furthermore, the approach presented in this paper allows a designer to
define participants who are trustworthy enough to transfer information between
other two participants without existence of a direct channel to achieve basic
routing functionality.",
  address="Springer Verlag",
  booktitle="Human Interface and the Management of Information. Interacting with Information",
  chapter="76281",
  edition="LNCS 6771",
  howpublished="print",
  institution="Springer Verlag",
  year="2011",
  month="march",
  pages="366--373",
  publisher="Springer Verlag",
  type="conference paper"
}