Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleDecember 1993
A pump for rapid, reliable, secure communication
CCS '93: Proceedings of the 1st ACM conference on Computer and communications securityPages 119–129https://doi.org/10.1145/168588.168604Communication from a low- to a high-level system without acknowledgements will be unreliable; with acknowledgements, it can be insecure. We propose to provide quantifiable security, acceptable reliability, and minimal performance penalties by ...
- ArticleDecember 1993
Adding time to a logic of authentication
CCS '93: Proceedings of the 1st ACM conference on Computer and communications securityPages 97–101https://doi.org/10.1145/168588.168600In [BAN89] Burrows, Abadi, and Needham presented a logic (BAN) for analyzing cryptographic protocols in terms of belief. This logic is quite useful in uncovering flaws in protocols; however, it also has produced confusion and controversy. Much of the ...
- ArticleDecember 1993
Random oracles are practical: a paradigm for designing efficient protocols
CCS '93: Proceedings of the 1st ACM conference on Computer and communications securityPages 62–73https://doi.org/10.1145/168588.168596We argue that the random oracle model—where all parties have access to a public random oracle—provides a bridge between cryptographic theory and cryptographic practice. In the paradigm we suggest, a practical protocol P is produced by first devising and ...