Text
Secure key establishment
Contents:
1 Introduction
2 Background Materials
3 A Flawed BR95 Partnership Function
4 On The Key Sharing Requirement
5 Comparison of Bellare–Rogaway and Canetti–Krawczyk Models
6 An Extension to the Bellare–Rogaway Model
7 Proof of Revised Yahalom Protocol
8 Errors in Computational Complexity Proofs for Protocols
9 On Session Key Construction
10 Complementing Computational Protocol Analysis
11 An Integrative Framework to Protocol Analysis and Repair
12 Conclusion and Future Work
No other version available