Sciweavers

1342 search results - page 11 / 269
» Attacks are Protocols Too
Sort
View
CSREASAM
2004
13 years 8 months ago
Experimental Analysis of the Arcanum Key Exchange Protocol
A VPN establishes a secure network using the insecure media of the Internet. However, before a VPN can be established keys must be exchanged between the communicating peers. In th...
Ajmal S. Mian, Raja Iqbal
ISCC
2007
IEEE
14 years 1 months ago
Validating Attacks on Authentication Protocols
— It is possible to show that well-known attacks on authentication protocols are flawed. This is a problem, since good protocols may thus be dismissed rather than improved and p...
Anders Moen Hagalisletto
WISTP
2009
Springer
14 years 2 months ago
Algebraic Attacks on RFID Protocols
Abstract. This work aims to identify the algebraic problems which enable many attacks on RFID protocols. Toward this goal, three emerging types of attacks on RFID protocols, concer...
Ton van Deursen, Sasa Radomirovic
ASIAN
2007
Springer
128views Algorithms» more  ASIAN 2007»
14 years 1 months ago
A Formal Analysis for Capturing Replay Attacks in Cryptographic Protocols
Abstract. We present a reduction semantics for the LYSA calculus extended with session information, for modelling cryptographic protocols, and a static analysis for it. If a protoc...
Han Gao, Chiara Bodei, Pierpaolo Degano, Hanne Rii...
CSFW
2005
IEEE
14 years 1 months ago
Reconstruction of Attacks against Cryptographic Protocols
We study an automatic technique for the verification of cryptographic protocols based on a Horn clause model of the protocol. This technique yields proofs valid for an unbounded ...
Xavier Allamigeon, Bruno Blanchet