Sciweavers

1490 search results - page 103 / 298
» The Logic of Authentication Protocols
Sort
View
GLVLSI
2007
IEEE
162views VLSI» more  GLVLSI 2007»
14 years 3 months ago
Design of an UHF RFID transponder for secure authentication
RFID technology increases rapidly its applicability in new areas of interest without guaranteeing security and privacy issues. This paper presents a new architecture of an RFID tr...
Paolo Bernardi, Filippo Gandino, Bartolomeo Montru...
TCC
2007
Springer
145views Cryptology» more  TCC 2007»
14 years 3 months ago
(Password) Authenticated Key Establishment: From 2-Party to Group
Abstract. A protocol compiler is described, that transforms any provably secure authenticated 2-party key establishment into a provably secure authenticated group key establishment...
Michel Abdalla, Jens-Matthias Bohli, Maria Isabel ...
GC
2004
Springer
14 years 2 months ago
For-LySa: UML for Authentication Analysis
The DEGAS project aims at enriching standard UML-centred development environments in such a way that the developers of global applications can exploit automated formal analyses wit...
Mikael Buchholtz, Carlo Montangero, Lara Perrone, ...
ESORICS
2000
Springer
14 years 16 days ago
Authentication and Confidentiality via IPSEC
The IP security protocols (IPsec) may be used via security gateways that apply cryptographic operations to provide security services to datagrams, and this mode of use is supported...
Joshua D. Guttman, Amy L. Herzog, F. Javier Thayer
ACSAC
1997
IEEE
14 years 15 days ago
An Efficient Message Authentication Scheme for Link State Routing
We study methods for reducing the cost of secure link state routing. In secure link state routing, routers may need to verify the authenticity of many routing updates, and some ro...
S. Cheung