Sciweavers

1490 search results - page 75 / 298
» The Logic of Authentication Protocols
Sort
View
CN
2000
72views more  CN 2000»
13 years 8 months ago
Security issues in control, management and routing protocols
Abstract-- The TCP/IP suite, the basis for today's Internet, lacks even the most basic mechanisms of authentication. As usage of the Internet increases, its scarcity of built-...
Madalina Baltatu, Antonio Lioy, Fabio Maino, Danie...
CSFW
2009
IEEE
14 years 3 months ago
Modeling and Verifying Physical Properties of Security Protocols for Wireless Networks
We present a formal model for modeling and reasoning about security protocols. Our model extends standard, inductive, trace-based, symbolic approaches with a formalization of phys...
Patrick Schaller, Benedikt Schmidt, David A. Basin...
MOBISEC
2009
Springer
14 years 3 months ago
SAVAH: Source Address Validation with Host Identity Protocol
Explosive growth of the Internet and lack of mechanisms that validate the authenticity of a packet source produced serious security and accounting issues. In this paper, we propose...
Dmitriy Kuptsov, Andrei Gurtov
CN
2000
64views more  CN 2000»
13 years 8 months ago
Risks of the Passport single signon protocol
Passport is a protocol that enables users to sign onto many different merchants' web pages by authenticating themselves only once to a common server. This is important becaus...
David P. Kormann, Aviel D. Rubin
ISW
2010
Springer
13 years 6 months ago
Security Analysis of the Extended Access Control Protocol for Machine Readable Travel Documents
We analyze the Extended Access Control (EAC) protocol for authenticated key agreement, recently proposed by the German Federal Office for Information Security (BSI) for the deploym...
Özgür Dagdelen, Marc Fischlin