Sciweavers

1490 search results - page 99 / 298
» The Logic of Authentication Protocols
Sort
View
NDSS
1997
IEEE
14 years 1 months ago
Probable Plaintext Cryptanalysis of the IP Security Protocols
The Internet Engineering Task Force (IETF) is in the process of adopting standards for IP-layer encryption and authentication (IPSEC). We describe how “probable plaintext” can...
Steven M. Bellovin
SIGCOMM
2004
ACM
14 years 2 months ago
A system for authenticated policy-compliant routing
Internet end users and ISPs alike have little control over how packets are routed outside of their own AS, restricting their ability to achieve levels of performance, reliability,...
Barath Raghavan, Alex C. Snoeren
CSFW
2002
IEEE
14 years 1 months ago
Types and Effects for Asymmetric Cryptographic Protocols
We present the first type and effect system for proving authenticity properties of security protocols based on asymmetric cryptography. The most significant new features of our ...
Andrew D. Gordon, Alan Jeffrey
CORR
2010
Springer
84views Education» more  CORR 2010»
13 years 9 months ago
On the Security of Non-Linear HB (NLHB) Protocol Against Passive Attack
As a variant of the HB authentication protocol for RFID systems, which relies on the complexity of decoding linear codes against passive attacks, Madhavan et al. presented Non-Line...
Mohammad Reza Sohizadeh Abyaneh
ACISP
2009
Springer
14 years 3 months ago
Towards Denial-of-Service-Resilient Key Agreement Protocols
Denial of service resilience is an important practical consideration for key agreement protocols in any hostile environment such as the Internet. There are well-known models that ...
Douglas Stebila, Berkant Ustaoglu