In the audit process of Internet activities of users in a local area network, one of the most difficult problems is the problem of source authentication i.e. establishing securely...
Two effective attacks, namely de-synchronization attack and impersonation attack, against Ha et al. 's LCSS RFID authentication protocol, Song and Mitchell's protocol are...
We propose a light-weight protocol for authentication of low-power devices. Our construction PUF-HB merges the positive qualities of two families of authentication functions. PUF ...
Abstract— In this paper, we propose an authentication and secure channel establishment protocol that is reliable and adaptable for multihop wireless home networks. The main idea ...
Han Sang Kim, Jin Wook Lee, Sandeep K. S. Gupta, Y...
We propose a generic modelling technique that can be used to extend existing frameworks for theoretical security analysis in order to capture the use of timestamps. We apply this t...