You are not logged in.

Detecting collusion attacks in security protocols

Chen, Qingfeng, Chen, Yi-Ping Phoebe, Zhang, Shichao and Zhang, Chengqi 2006, Detecting collusion attacks in security protocols, Lecture notes in computer science, vol. 3841, pp. 297-306, doi: 10.1007/11610113_27.

Attached Files
Name Description MIMEType Size Downloads

Title Detecting collusion attacks in security protocols
Author(s) Chen, Qingfeng
Chen, Yi-Ping Phoebe
Zhang, Shichao
Zhang, Chengqi
Journal name Lecture notes in computer science
Volume number 3841
Start page 297
End page 306
Publisher Springer-Verlag
Place of publication Heidelberg, Germany
Publication date 2006
ISSN 0302-9743
Summary Security protocols have been widely used to safeguard secure electronic transactions. We usually assume that principals are credible and shall not maliciously disclose their individual secrets to someone else. Nevertheless, it is impractical to completely ignore the possibility that some principals may collude in private to achieve a fraudulent or illegal purpose. Therefore, it is critical to address the possibility of collusion attacks in order to correctly analyse security protocols. This paper proposes a framework by which to detect collusion attacks in security protocols. The possibility of security threats from insiders is especially taken into account. The case study demonstrates that our methods are useful and promising in discovering and preventing collusion attacks.
Language eng
DOI 10.1007/11610113_27
Field of Research 080610 Information Systems Organisation
HERDC Research category C1 Refereed article in a scholarly journal
Copyright notice ©2006, Springer-Verlag
Persistent URL

Document type: Journal Article
Collection: School of Engineering and Information Technology
Connect to link resolver
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Scopus Citation Count Cited 4 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 428 Abstract Views, 0 File Downloads  -  Detailed Statistics
Created: Mon, 07 Jul 2008, 08:58:13 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact