We present a number of attacks, some new, on public key protocols. We also advance a number of principles which may help designers avoid many of the pitfalls, and help attackers spot errors which can be exploited.
CITATION STYLE
Anderson, R., & Needham, R. (1995). Robustness principles for public key protocols. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 963, pp. 236–247). Springer Verlag. https://doi.org/10.1007/3-540-44750-4_19
Mendeley helps you to discover research relevant for your work.