Sciweavers

253 search results - page 19 / 51
» Compositional Analysis of Authentication Protocols
Sort
View
ICMCS
2005
IEEE
296views Multimedia» more  ICMCS 2005»
14 years 1 months ago
An Association-Based Graphical Password Design Resistant to Shoulder-Surfing Attack
In line with the recent call for technology on Image Based Authentication (IBA) in JPEG committee [1], we present a novel graphical password design in this paper. It rests on the ...
Zhi Li, Qibin Sun, Yong Lian, Daniele D. Giusto
CSFW
2003
IEEE
14 years 28 days ago
Automatic Validation of Protocol Narration
We perform a systematic expansion of protocol narrations into terms of a process algebra in order to make precise some of the detailed checks that need to be made in a protocol. W...
Chiara Bodei, Mikael Buchholtz, Pierpaolo Degano, ...
GC
2004
Springer
14 years 1 months ago
For-LySa: UML for Authentication Analysis
The DEGAS project aims at enriching standard UML-centred development environments in such a way that the developers of global applications can exploit automated formal analyses wit...
Mikael Buchholtz, Carlo Montangero, Lara Perrone, ...
PROVSEC
2007
Springer
14 years 1 months ago
Stronger Security of Authenticated Key Exchange
In this paper we study security definitions for authenticated key exchange (AKE) protocols. We observe that there are several families of attacks on AKE protocols that lie outsid...
Brian A. LaMacchia, Kristin Lauter, Anton Mityagin
IAJIT
2010
87views more  IAJIT 2010»
13 years 6 months ago
A performance comparison of MD5 authenticated routing traffic with EIGRP, RIPv2, and OSPF
: Routing is the process of forwarding data across an inter-network from a designated source to a final destination. Along the way from source to destination, at least one intermed...
Khalid Abu Al-Saud, Hatim Mohd Tahir, Moutaz Saleh...