Chris J. Mitchell (2005) Timestamps and authentication protocols.
Full text access: Open
Timestamp-based authentication and key establishment protocols have received a number of criticisms, despite their potential efficiency advantages. The purpose of this paper is to propose a novel timestamp management method which has the potential to increase the scope of applicability of such protocols. Since timestamp-based protocols typically involve one less message than challenge-response protocols, the potential efficiency gains are considerable.
This is a Published version This version's date is: 25/02/2005 This item is peer reviewed
https://repository.royalholloway.ac.uk/items/c1d05236-9edf-f165-4008-1dfc03b0d977/1/
Deposited by () on 13-Jul-2010 in Royal Holloway Research Online.Last modified on 13-Dec-2010
[1] L. Chen, D. Gollmann, and C. Mitchell. Tailoring authentication protocolsto match underlying mechanisms. In J. Pieprzyk and J. Seberry,editors, Information Security and Privacy — Proceedings: First AustralasianConference, Wollongong, NSW, Australia, June 1996, pages121–133. Springer-Verlag, Berlin, 1996.
[2] L. Gong. A security risk of depending on synchronised clocks. ACMOperating Systems Review, 26(1):49–53, January 1992.
[3] K.-Y. Lam. Building an authentication service for distributed systems.Journal of Computer Security, 2:73–84, 1993.
[4] A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone. Handbook ofApplied Cryptography. CRC Press, Boca Raton, 1997.
[5] C. J. Mitchell. Making serial number based authentication robust againstloss of state. ACM Operating Systems Review, 34(3):56–59, July 2000.