Sciweavers

IEEEIAS
2009
IEEE
13 years 9 months ago
An Improved Scheme of Single Sign-on Protocol
In order to avoid security threats caused by password attack and replay attack in single sign-on protocal, the most methods on sovling these issues are making use of complicated te...
Yang Jian
IJNSEC
2006
94views more  IJNSEC 2006»
13 years 11 months ago
Attacks on An ISO/IEC 11770-2 Key Establishment Protocol
Two possible types of attack (a replay attack and a type attack) on a key establishment protocol (mechanism 12) standardised in ISO/IEC 11770-2 are described and two solutions are...
Zhaohui Cheng, Richard Comley
CTRSA
2008
Springer
109views Cryptology» more  CTRSA 2008»
14 years 1 months ago
Super-Efficient Verification of Dynamic Outsourced Databases
We develop new algorithmic and cryptographic techniques for authenticating the results of queries over databases that are outsourced to an untrusted responder. We depart from previ...
Michael T. Goodrich, Roberto Tamassia, Nikos Trian...
ICC
2008
IEEE
163views Communications» more  ICC 2008»
14 years 6 months ago
A New Replay Attack Against Anonymous Communication Networks
Abstract— Tor is a real-world, circuit-based low-latency anonymous communication network, supporting TCP applications on the Internet. In this paper, we present a new class of at...
Ryan Pries, Wei Yu, Xinwen Fu, Wei Zhao