Sciweavers

1490 search results - page 75 / 298
» The Logic of Authentication Protocols
Sort
View
111
Voted
CN
2000
72views more  CN 2000»
15 years 3 months ago
Security issues in control, management and routing protocols
Abstract-- The TCP/IP suite, the basis for today's Internet, lacks even the most basic mechanisms of authentication. As usage of the Internet increases, its scarcity of built-...
Madalina Baltatu, Antonio Lioy, Fabio Maino, Danie...
135
Voted
CSFW
2009
IEEE
15 years 10 months ago
Modeling and Verifying Physical Properties of Security Protocols for Wireless Networks
We present a formal model for modeling and reasoning about security protocols. Our model extends standard, inductive, trace-based, symbolic approaches with a formalization of phys...
Patrick Schaller, Benedikt Schmidt, David A. Basin...
134
Voted
MOBISEC
2009
Springer
15 years 10 months ago
SAVAH: Source Address Validation with Host Identity Protocol
Explosive growth of the Internet and lack of mechanisms that validate the authenticity of a packet source produced serious security and accounting issues. In this paper, we propose...
Dmitriy Kuptsov, Andrei Gurtov
116
Voted
CN
2000
64views more  CN 2000»
15 years 3 months ago
Risks of the Passport single signon protocol
Passport is a protocol that enables users to sign onto many different merchants' web pages by authenticating themselves only once to a common server. This is important becaus...
David P. Kormann, Aviel D. Rubin
151
Voted
ISW
2010
Springer
15 years 1 months ago
Security Analysis of the Extended Access Control Protocol for Machine Readable Travel Documents
We analyze the Extended Access Control (EAC) protocol for authenticated key agreement, recently proposed by the German Federal Office for Information Security (BSI) for the deploym...
Özgür Dagdelen, Marc Fischlin