Abstract
In this paper we introduce a framework in which we can investigate the
possibility of adapting a security protocol in order to obtain optimal
efficiency according to the communication channels available. This
method is based on the observation that there is a partial order
imposed upon the actions of the various parties involved in a
protocol. We define operations permitted on the partially ordered set
associated with the protocol and obtain transformations of the
original protocol while preserving the security properties.
Performing these operations on the protocol we enumerate the options
available to a system.
possibility of adapting a security protocol in order to obtain optimal
efficiency according to the communication channels available. This
method is based on the observation that there is a partial order
imposed upon the actions of the various parties involved in a
protocol. We define operations permitted on the partially ordered set
associated with the protocol and obtain transformations of the
original protocol while preserving the security properties.
Performing these operations on the protocol we enumerate the options
available to a system.
Original language | English |
---|---|
Pages (from-to) | 55-61 |
Number of pages | 6 |
Journal | IEEE Journal on Selected Areas in Communications |
Volume | 21 |
Issue number | 1 |
DOIs | |
Publication status | Published - 2003 |
Keywords
- Authentication protocols
- Partially ordered sets
- Strand space model