Sciweavers

179 search results - page 11 / 36
» Analysis of EAP-GPSK Authentication Protocol
Sort
View
CISC
2005
Springer
116views Cryptology» more  CISC 2005»
14 years 1 months ago
Specifying Authentication Using Signal Events in CSP
The formal analysis of cryptographic protocols has developed into a comprehensive body of knowledge, building on a wide variety of formalisms and treating a diverse range of securi...
Siraj A. Shaikh, Vicky J. Bush, Steve A. Schneider
IADIS
2003
13 years 9 months ago
Enhance Opensst Protocol's Security with Smart Card
As an open source project, Open Simple Secure Transaction (OpenSST) protocol aims to be a secure and transactionoriented protocol for the unsecured network. At present a prototype...
Xinhua Zhang, Alexandre Dulaunoy, Christoph Meinel
CSREASAM
2006
13 years 9 months ago
Efficient and Secure Authentication Protocols for Mobile VoIP Communications
Mobile Voice over IP (Mobile VoIP) allows mobile users to continuously talk with each others while roaming across different networks. In such wireless application, it is vulnerabl...
Huang-Ju Chen, Jyh-Ming Huang, Lei Wang
EUC
2007
Springer
13 years 11 months ago
An Efficient Authentication Protocol for RFID Systems Resistant to Active Attacks
Traditional cryptographic primitives are not supported on low-cost RFID tags since, at most, 4K gates can be devoted to securityrelated tasks. Despite this, there are a vast number...
Pedro Peris-Lopez, Julio César Herná...
SP
2006
IEEE
104views Security Privacy» more  SP 2006»
14 years 1 months ago
A Logic for Constraint-based Security Protocol Analysis
We propose PS-LTL, a pure-past security linear temporal logic that allows the specification of a variety of authentication, secrecy and data freshness properties. Furthermore, we...
Ricardo Corin, Sandro Etalle, Ari Saptawijaya