[ Last changed: 10th October 1995 ]
Security Group Seminar, 22nd August 1995
Authentication is one of the bases of security in distributed
systems, yet authentication protocols often contain serious flaws.
We discuss some principles for the design of authentication
protocols. The principles are neither necessary nor sufficient for
correctness. They are however helpful, in that adherence to them
would have avoided a considerable number of published errors. We
also discuss logics designed for the analysis of authentication
protocols, and their relation to the informal principles.
- Martin Abadi, DEC Systems Research Center
- Tuesday 22nd August 11:00am
Old Discussion Room
- AUTHENTICATION IN DISTRIBUTED SYSTEMS -
PRINCIPLES AND PITFALLS
Security Group Seminar, 22nd August 1995 / Mark.Lomas@cl.cam.ac.uk