Cart (Loading....) | Create Account
Close category search window
 

The changing environment for security protocols

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)
Needham, R.M. ; Cambridge Univ., UK

The systematic study of security protocols started, as far as the public literature is concerned, almost 20 years ago. A paper by M.D. Schroeder and the present writer may be taken as a specimen; it was written in 1977 and published in 1978. It was, of course, written against the background of the technology of the time and made various assumptions about the organizational context in which its techniques would be used. The substantial research literature that has since appeared has, by and large, made similar assumptions about the technological organizational environments. Those environments have in fact changed very considerably, and the purpose of this article is to consider whether the changes should affect our approach to security problems. It turns out that where confidentiality is concerned, as distinct from authenticity and integrity, there is indeed a new range of options

Published in:

Network, IEEE  (Volume:11 ,  Issue: 3 )

Date of Publication:

May/Jun 1997

Need Help?


IEEE Advancing Technology for Humanity About IEEE Xplore | Contact | Help | Terms of Use | Nondiscrimination Policy | Site Map | Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest professional association for the advancement of technology.
© Copyright 2014 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.