Compliant cryptologic protocols
Literally, the word compliance suggests conformity in fulfilling official requirements. This paper presents the results of the analysis and design of a class of protocols called compliant cryptologic protocols (CCPs). The paper presents a notion for compliance in cryptosystems that is conducive as a cryptologic goal. CCPs are employed in security systems used by at least two mutually mistrusting sets of entities. The individuals in the sets of entities only trust the design of the security system and any trusted third party the security system may include. Such a security system can be thought of as a broker between the mistrusting sets of entities.
Impact and interest:
Citation counts are sourced monthly from and citation databases.
These databases contain citations from different subsets of available publications and different time periods and thus the citation count from each is usually different. Some works are not in either database and no count is displayed. Scopus includes citations from articles published in 1996 onwards, and Web of Science® generally from 1980 onwards.
Citations counts from theindexing service can be viewed at the linked Google Scholar™ search.
|Item Type:||Journal Article|
|Additional Information:||For more information, please refer to the journal’s website (see hypertext link) or contact the author.|
|Divisions:||Past > QUT Faculties & Divisions > Faculty of Science and Technology|
|Copyright Owner:||Copyright 2002 Springer|
|Copyright Statement:||The original publication is available at SpringerLink
|Deposited On:||27 Sep 2007 00:00|
|Last Modified:||15 Jan 2009 07:47|
Repository Staff Only: item control page