Abstract
I’d like to start by saying that at a previous workshop I suggested that it might be possible to combine proven security protocols in such a way that a composition was insecure. All of the examples that I was able to give people said “Oh, no, nobody would ever do that”, and so I’d like to thank Peter Landrock for giving me some real world examples of the sort of protocols that people are genuinely proposing. I hope they’re proposing them without any ill intent, but others might use them in ways that the designers didn’t actually intend.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lomas, M. (1998). Abuse of Process. In: Christianson, B., Crispo, B., Harbison, W.S., Roe, M. (eds) Security Protocols. Security Protocols 1998. Lecture Notes in Computer Science, vol 1550. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-49135-X_20
Download citation
DOI: https://doi.org/10.1007/3-540-49135-X_20
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-65663-0
Online ISBN: 978-3-540-49135-4
eBook Packages: Springer Book Archive