[go: up one dir, main page]

Academia.eduAcademia.edu

Retaliation: Can we live with flaws?

2006

Abstract. Security protocols intend to give their parties reasonable assurance that certain security properties will protect their communication session. However, the literature confirms that the protocols may suffer subtle and hidden attacks. Flawed protocols are customarily sent back to the design process, but the costs of reengineering a deployed protocol may be prohibitive.

This document is currently being converted. Please check back in a few minutes.