Sciweavers

860 search results - page 9 / 172
» Uncovering Attacks on Security Protocols
Sort
View
PKC
2009
Springer
129views Cryptology» more  PKC 2009»
14 years 7 months ago
Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols
A key exchange protocol allows a set of parties to agree upon a secret session key over a public network. Two-party key exchange (2PKE) protocols have been rigorously analyzed unde...
Colin Boyd, Juan Manuel González Nieto, M. ...
JAR
2006
107views more  JAR 2006»
13 years 6 months ago
Attacking Group Protocols by Refuting Incorrect Inductive Conjectures
Automated tools for finding attacks on flawed security protocols often fail to quately with group protocols. This is because the abstractions made to improve performance on fixed ...
Graham Steel, Alan Bundy
CCS
2005
ACM
14 years 7 days ago
Deciding security of protocols against off-line guessing attacks
We provide an effective procedure for deciding the existence of off-line guessing attacks on security protocols, for a bounded number of sessions. The procedure consists of a co...
Mathieu Baudet
JCM
2006
112views more  JCM 2006»
13 years 6 months ago
A Secure RFID Identity Reporting Protocol for Physical Attack Resistance
RFID tags will exist pervasively in our daily life in a near future. In RFID systems, privacy and security are of critical importance to avoid potential tracking abuse and privacy ...
Zhaoyu Liu, Dichao Peng
CORR
2010
Springer
102views Education» more  CORR 2010»
13 years 6 months ago
How to prevent type-flaw and multi-protocol attacks on security protocols under Exclusive-OR
Type-flaw attacks and multi-protocol attacks on security protocols have been frequently reported in the literature. Heather et al. and Guttman et al. proved that these could be pr...
Sreekanth Malladi