2013
DOI: 10.1016/j.cose.2012.10.004
|View full text |Cite
|
Sign up to set email alerts
|

On the detection of desynchronisation attacks against security protocols that use dynamic shared secrets

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 21 publications
0
1
0
Order By: Relevance
“…The work on designing new trustworthy security protocols continues to-date, as does the identification and elimination of design weaknesses in existing protocols [27] [28] [29]. Lasc, Dojen and Coffey [30] identified desynchronisation attacks on a group of protocols that use dynamic shared secrets update mechanisms for wireless communications. The authors presented design guidelines to prevent such weaknesses and a formal system to model update mechanisms for shared secrets.…”
Section: Related Workmentioning
confidence: 99%
“…The work on designing new trustworthy security protocols continues to-date, as does the identification and elimination of design weaknesses in existing protocols [27] [28] [29]. Lasc, Dojen and Coffey [30] identified desynchronisation attacks on a group of protocols that use dynamic shared secrets update mechanisms for wireless communications. The authors presented design guidelines to prevent such weaknesses and a formal system to model update mechanisms for shared secrets.…”
Section: Related Workmentioning
confidence: 99%