Skip to main content

Protocol Analysis, Composability and Computation

  • Chapter
Computer Systems

Part of the book series: Monographs in Computer Science ((MCS))

  • 283 Accesses

Conclusion

The protocol work that started off a quarter of a century ago may have seemed at the time like a minor detail within the larger project of designing robust distributed systems. Yet it has already grown into the main unifying theme of security engineering. Application-level protocols, and especially those from which an attacker can harvest data over many runs, open up new problems. The resulting analysis techniques are set to invade the world of composable security and the world of multiparty computation. The influence and consequences of Roger’s contribution just keep on growing.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Burrows, M., Abadi, M., and Needham, R.M., ‘A logic of authentication,’ ACM Trans. on Computer Systems, vol. 8,no. 1, pp. 18–36, 1990.

    Article  Google Scholar 

  2. Needham, R.M., and Schroeder, R.M., ‘Using encryption for authentication in large networks of computers.’ Comm. ACM, vol. 21,no. 12, pp. 993–999, 1978.

    Article  Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag New York, Inc.

About this chapter

Cite this chapter

Anderson, R., Bond, M. (2004). Protocol Analysis, Composability and Computation. In: Herbert, A., Jones, K.S. (eds) Computer Systems. Monographs in Computer Science. Springer, New York, NY. https://doi.org/10.1007/0-387-21821-1_3

Download citation

  • DOI: https://doi.org/10.1007/0-387-21821-1_3

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-0-387-20170-2

  • Online ISBN: 978-0-387-21821-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics