Posets and protocols - picking the right three-party protocol. / Ng, Siaw-Lynn.

In: IEEE Journal on Selected Areas in Communications, Vol. 21, No. 1, 2003, p. 55-61.

Research output: Contribution to journalArticle

Published

Standard

Posets and protocols - picking the right three-party protocol. / Ng, Siaw-Lynn.

In: IEEE Journal on Selected Areas in Communications, Vol. 21, No. 1, 2003, p. 55-61.

Research output: Contribution to journalArticle

Harvard

Ng, S-L 2003, 'Posets and protocols - picking the right three-party protocol.', IEEE Journal on Selected Areas in Communications, vol. 21, no. 1, pp. 55-61. https://doi.org/10.1109/JSAC.2002.806126

APA

Ng, S-L. (2003). Posets and protocols - picking the right three-party protocol. IEEE Journal on Selected Areas in Communications, 21(1), 55-61. https://doi.org/10.1109/JSAC.2002.806126

Vancouver

Author

Ng, Siaw-Lynn. / Posets and protocols - picking the right three-party protocol. In: IEEE Journal on Selected Areas in Communications. 2003 ; Vol. 21, No. 1. pp. 55-61.

BibTeX

@article{525a577202504d67b950fe0de67efdd7,
title = "Posets and protocols - picking the right three-party protocol.",
abstract = "In this paper we introduce a framework in which we can investigate thepossibility of adapting a security protocol in order to obtain optimalefficiency according to the communication channels available. Thismethod is based on the observation that there is a partial orderimposed upon the actions of the various parties involved in aprotocol. We define operations permitted on the partially ordered setassociated with the protocol and obtain transformations of theoriginal protocol while preserving the security properties.Performing these operations on the protocol we enumerate the optionsavailable to a system.",
keywords = "Authentication protocols, Partially ordered sets, Strand space model",
author = "Siaw-Lynn Ng",
year = "2003",
doi = "http://dx.doi.org/10.1109/JSAC.2002.806126",
language = "English",
volume = "21",
pages = "55--61",
journal = "IEEE Journal on Selected Areas in Communications",
issn = "0733-8716",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
number = "1",

}

RIS

TY - JOUR

T1 - Posets and protocols - picking the right three-party protocol.

AU - Ng, Siaw-Lynn

PY - 2003

Y1 - 2003

N2 - In this paper we introduce a framework in which we can investigate thepossibility of adapting a security protocol in order to obtain optimalefficiency according to the communication channels available. Thismethod is based on the observation that there is a partial orderimposed upon the actions of the various parties involved in aprotocol. We define operations permitted on the partially ordered setassociated with the protocol and obtain transformations of theoriginal protocol while preserving the security properties.Performing these operations on the protocol we enumerate the optionsavailable to a system.

AB - In this paper we introduce a framework in which we can investigate thepossibility of adapting a security protocol in order to obtain optimalefficiency according to the communication channels available. Thismethod is based on the observation that there is a partial orderimposed upon the actions of the various parties involved in aprotocol. We define operations permitted on the partially ordered setassociated with the protocol and obtain transformations of theoriginal protocol while preserving the security properties.Performing these operations on the protocol we enumerate the optionsavailable to a system.

KW - Authentication protocols

KW - Partially ordered sets

KW - Strand space model

U2 - http://dx.doi.org/10.1109/JSAC.2002.806126

DO - http://dx.doi.org/10.1109/JSAC.2002.806126

M3 - Article

VL - 21

SP - 55

EP - 61

JO - IEEE Journal on Selected Areas in Communications

JF - IEEE Journal on Selected Areas in Communications

SN - 0733-8716

IS - 1

ER -