ASICS: authenticated key exchange security incorporating certification systems
Most security models for authenticated key exchange (AKE) do not explicitly model the associated certification system, which includes the certification authority (CA) and its behaviour. However, there are several well-known and realistic attacks on AKE protocols which exploit various forms of malici...
Main Authors: | , , , , , |
---|---|
Format: | Conference item |
Published: |
Springer
2013
|