ASICS: authenticated key exchange security incorporating certification systems

Most security models for authenticated key exchange (AKE) do not explicitly model the associated certification system, which includes the certification authority (CA) and its behaviour. However, there are several well-known and realistic attacks on AKE protocols which exploit various forms of malici...

Full description

Bibliographic Details
Main Authors: Boyd, C, Feltz, M, Paterson, K, Poettering, B, Stebila, D, Cremers, C
Format: Conference item
Published: Springer 2013