Sciweavers

176 search results - page 12 / 36
» Abstraction and Refinement in Protocol Derivation
Sort
View
EUROCRYPT
2003
Springer
14 years 1 months ago
A Framework for Password-Based Authenticated Key Exchange
Abstract. In this paper we present a general framework for passwordbased authenticated key exchange protocols, in the common reference odel. Our protocol is actually an abstraction...
Rosario Gennaro, Yehuda Lindell
ACNS
2008
Springer
132views Cryptology» more  ACNS 2008»
14 years 2 months ago
Analysis of EAP-GPSK Authentication Protocol
Abstract. The EAP-GPSK protocol is a lightweight, flexible authentication protocol relying on symmetric key cryptography. It is part of an ongoing IETF process to develop authenti...
John C. Mitchell, Arnab Roy, Paul Rowe, Andre Sced...
ICC
1997
IEEE
159views Communications» more  ICC 1997»
14 years 5 hour ago
Collision Avoidance and Resolution Multiple Access: First-Success Protocols
Abstract—Collision avoidance and resolution multiple access (CARMA) protocols establish a three-way handshake between sender and receiver to attempt to avoid collisions, and reso...
Rodrigo Garcés, J. J. Garcia-Luna-Aceves
ISCC
2003
IEEE
14 years 1 months ago
Optical CDMA Random Access Protocols
Abstract—The link layer of an optical direct-detection code-division multiple-access (CDMA) packet network is considered. Two different protocols that need pretransmission coordi...
Hossam M. H. Shalaby
RTA
2009
Springer
14 years 2 months ago
Protocol Security and Algebraic Properties: Decision Results for a Bounded Number of Sessions
Abstract. We consider the problem of deciding the security of cryptographic protocols for a bounded number of sessions, taking into account some algebraic properties of the securit...
Sergiu Bursuc, Hubert Comon-Lundh