Cryptographically sound theorem proving
Christoph Sprenger, David Basin, et al.
CSF 2006
The Liberty-enabled client and proxy (LECP) protocol's profile is discussed. The LECP protocol is essentially a three-party authentication and channel-establishment in the standard setting of protocols such as Needham-Schroeder or Kerberos, in which all three parties run specific protocol engines. The main advantage of channel-based protocols is that they work with secure sockets layer (SSL) or transport-layer security (TLS), the only current ubiquitous cryptographic infrastructure. Several concerns disappear with an enabled client, as in the LECP protocol, if the operational and user-interface aspects are well designed.
Christoph Sprenger, David Basin, et al.
CSF 2006
N. Asokan, Hervé Debar, et al.
Computer Networks
Michael Backes, Birgit Pfitzmann, et al.
Information and Computation
Anja Jerichow, Jan Müller, et al.
IEEE Journal on Selected Areas in Communications