Sciweavers

1490 search results - page 23 / 298
» The Logic of Authentication Protocols
Sort
View
69
Voted
CORR
2010
Springer
56views Education» more  CORR 2010»
15 years 3 months ago
An attack on MySQL's login protocol
The MySQL challenge
Ivan Arce, Emiliano Kargieman, Gerardo Richarte, C...
CIS
2007
Springer
15 years 9 months ago
A New Provably Secure Authentication and Key Agreement Mechanism for SIP Using Certificateless Public-Key Cryptography
The session initiation protocol (SIP) is considered as the dominant signaling protocol for calls over the internet. However, SIP authentication typically uses HTTP digest authentic...
Fengjiao Wang, Yuqing Zhang
TC
2008
15 years 3 months ago
Computationally Efficient PKI-Based Single Sign-On Protocol, PKASSO for Mobile Devices
In an attempt to expand Public Key Infrastructure (PKI) usage to a ubiquitous and mobile computing environment, we found that the deployment of the PKI on a resource-constrained de...
Ki-Woong Park, Sang Seok Lim, Kyu Ho Park
127
Voted
ITRE
2005
IEEE
15 years 9 months ago
Securing RSVP and RSVP-TE signaling protocols and their performance study
RSVP and RSVP-TE are signaling protocols used to set up paths and/or support Quality of Service (QoS) requirements in IP and MPLS-based networks, respectively. This paper analyzes...
Jin Zhi, Chung-Horng Lung, Xia Xu, Anand Srinivasa...
153
Voted
ASIACRYPT
2004
Springer
15 years 9 months ago
New Approaches to Password Authenticated Key Exchange Based on RSA
We investigate efficient protocols for password-authenticated key exchange based on the RSA public-key cryptosystem. To date, most of the published protocols for password-authentic...
Muxiang Zhang