Toward a Broader View of Security Protocols

Computer and network security researchers usually focus on the security of computers and networks. Although it might seem as if there is more than enough insecurity here to keep all of us fully occupied for the foreseeable future, this narrow view of our domain may actually be contributing to the very problems that we are trying to solve. We miss important insights from, and opportunities to make contributions to, a larger world that has been grappling with security since long before the computer was invented.

[1]  Paul C. Kocher,et al.  Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.

[2]  Angelos D. Keromytis,et al.  Experience with the KeyNote Trust Management System: Applications and Future Directions , 2003, iTrust.

[3]  Siva Sai Yerubandi,et al.  Differential Power Analysis , 2002 .

[4]  Matt Blaze Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks , 2002, IACR Cryptol. ePrint Arch..

[5]  Jonathan M. Smith,et al.  Strongman: a scalable solution to trust management in networks , 2001 .

[6]  Michael J. Townsend,et al.  Thomas Piketty: Capital in the twenty-first century , 2014, Public Choice.

[7]  William A. Arbaugh,et al.  Chaining layered integrity checks , 1999 .

[8]  J. Feigenbaum,et al.  The KeyNote trust management system version2, IETF RFC 2704 , 1999 .

[9]  Joan Feigenbaum,et al.  The KeyNote Trust-Management System , 1998 .

[10]  Sun Meifeng,et al.  KeyNote Trust Management System , 2002 .

[11]  Joan Feigenbaum,et al.  A formal treatment of remotely keyed encryption , 1998, SODA '99.

[12]  Scott Shenker,et al.  Design guidelines for robust Internet protocols , 2003, CCRV.

[13]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[14]  Markus G. Kuhn,et al.  Tamper resistance: a cautionary note , 1996 .

[15]  Joan Feigenbaum,et al.  Compliance Checking in the PolicyMaker Trust Management System , 1998, Financial Cryptography.

[16]  Martín Abadi,et al.  Prudent engineering practice for cryptographic protocols , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.

[17]  Matt Blaze,et al.  Rights Amplification in Master-Keyed Mechanical Locks , 2003, IEEE Secur. Priv..

[18]  Joan Feigenbaum,et al.  The KeyNote Trust-Management System Version 2 , 1999, RFC.

[19]  Joan Feigenbaum,et al.  The Role of Trust Management in Distributed Systems Security , 2001, Secure Internet Programming.

[20]  Markus G. Kuhn,et al.  Optical time-domain eavesdropping risks of CRT displays , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.

[21]  Markus G. Kuhn,et al.  Cipher Instruction Search Attack on the Bus-Encryption Security Microcontroller DS5002FP , 1998, IEEE Trans. Computers.

[22]  Roger M. Needham,et al.  Denial of service: an example , 1994, CACM.