Sciweavers

24 search results - page 1 / 5
» Classification of Authentication Protocols: A Practical Appr...
Sort
View
ISW
2000
Springer
14 years 2 months ago
Classification of Authentication Protocols: A Practical Approach
We propose a simple classification method for public-key based authentication protocols, which consists of identifying several basic properties leading to a large number of generic...
DongGook Park, Colin Boyd, Ed Dawson
RFIDSEC
2010
13 years 9 months ago
Strong Authentication and Strong Integrity (SASI) Is Not That Strong
In this work, we present a practical passive attack on SASI, an ultra-lightweight mutual authentication protocol for RFID. This attack can be used to reveal with overwhelming proba...
Gildas Avoine, Xavier Carpent, Benjamin Martin 000...
CTRSA
2006
Springer
140views Cryptology» more  CTRSA 2006»
14 years 2 months ago
Session Corruption Attack and Improvements on Encryption Based MT-Authenticators
Bellare, Canetti and Krawczyk proposed a security model (BCK-model) for authentication and key exchange protocols in 1998. The model not only reasonably captures the power of pract...
Xiaojian Tian, Duncan S. Wong
OPODIS
2007
14 years 10 days ago
Making Distributed Applications Robust
We present a novel translation of systems that are tolerant of crash failures to systems that are tolerant of Byzantine failures in an asynchronous environment, making weaker assum...
Chi Ho, Danny Dolev, Robbert van Renesse
IJNSEC
2008
145views more  IJNSEC 2008»
13 years 11 months ago
Efficient Certificateless Authentication and Key Agreement (CL-AK) for Grid Computing
Most of the current security architectures for grid systems use conventional public key infrastructure (PKI) to authenticate grid members and to secure resource allocation to thes...
Shengbao Wang, Zhenfu Cao, Haiyong Bao