Compliant cryptologic protocols

Dawson, Edward P., Viswanathan, Kapaleeswaran, & Boyd, Colin A. (2002) Compliant cryptologic protocols. International Journal of Information Security, 1(3), pp. 189-202.

View at publisher


Literally, the word compliance suggests conformity in fulfilling official requirements. This paper presents the results of the analysis and design of a class of protocols called compliant cryptologic protocols (CCPs). The paper presents a notion for compliance in cryptosystems that is conducive as a cryptologic goal. CCPs are employed in security systems used by at least two mutually mistrusting sets of entities. The individuals in the sets of entities only trust the design of the security system and any trusted third party the security system may include. Such a security system can be thought of as a broker between the mistrusting sets of entities.

Impact and interest:

Citation counts are sourced monthly from Scopus and Web of Science® citation databases.

These databases contain citations from different subsets of available publications and different time periods and thus the citation count from each is usually different. Some works are not in either database and no count is displayed. Scopus includes citations from articles published in 1996 onwards, and Web of Science® generally from 1980 onwards.

Citations counts from the Google Scholar™ indexing service can be viewed at the linked Google Scholar™ search.

ID Code: 9803
Item Type: Journal Article
Refereed: Yes
Additional Information: For more information, please refer to the journal’s website (see hypertext link) or contact the author.
DOI: 10.1007/s10207-002-0016-y
ISSN: 1615-5270
Divisions: Past > QUT Faculties & Divisions > Faculty of Science and Technology
Copyright Owner: Copyright 2002 Springer
Copyright Statement: The original publication is available at SpringerLink
Deposited On: 27 Sep 2007 00:00
Last Modified: 15 Jan 2009 07:47

Export: EndNote | Dublin Core | BibTeX

Repository Staff Only: item control page