KTH-SEECS Applied Information Security Lab

National University of Sciences and Technology (NUST)

Secure Protocols

Generic Security Protocols play an important role in implementing security services in distributed applications and cloud computing environments. They are based on the concepts of generic security objects and on a modular approach. The objects of security protocols are complete in terms of their functionality, so each object provides features to client-server applications. The protocols are designed using well-established secure technologies and standards in order to make their host components interoperable with other components. Some of our authentication protocols are specifically designed for a specific operating system, while other protocols are platform-independent and generic. Therefore, they can be integrated with any application for secure communication, authorization, key distribution, Single Sign-On and strong authentication.