نتایج جستجو برای: avispa

تعداد نتایج: 166  

Journal: :IJSN 2009
Hatem Bettahar Mothanna Alkubeily Abdelmadjid Bouabdallah

The Application Level Multicast (ALM) simplifies the implementation of group communication. However, it still suffer from the same management overhead in case of highly dynamic sessions. In this paper, we propose an efficient key management protocol, called Transition Key Scheme (TKS), for ALM communication. TKS aims to reduce the key management overhead in case of highly dynamic membership ses...

Journal: :I. J. Network Security 2011
Mohamed Salah Bouassida

Security and protection of private user information are a prerequisite for the deployment of the vehicular network technologies. Nevertheless, the establishment of a secure communication architecture within vehicular ad hoc networks address special challenges, due to the characteristic and specificities of such environment (high dynamic and mobility of nodes, high rate of topology changes, high...

2006
David von Oheimb Jorge Cuéllar

Geographic privacy services provide location information on roaming targets to location recipients via location servers, in a way that protects the privacy of the individuals involved. In this paper we propose and discuss new protocols representing the core of Geopriv, with particular focus on the security requirements stated in the IETF’s RFC 3693. Using the AVISPA tool, we check that these re...

Journal: :EURASIP J. Wireless Comm. and Networking 2009
Ali Al Shidhani Victor C. M. Leung

Interworking Universal Mobile Telecommunication System (UMTS) and IEEE 802.11 Wireless Local Area Networks (WLANs) introduce new challenges including the design of secured and fast handover protocols. Handover operations within and between networks must not compromise the security of the networks involved. In addition, handovers must be instantaneous to sustain the quality of service (QoS) of t...

Journal: :Annales des Télécommunications 2007
Mohamed Salah Bouassida Najah Chridi Isabelle Chrisment Olivier Festor Laurent Vigneron

Emerging applications require secure group communications around hierarchical architecture protocols, like military or public emergency applications. However, conceiving such secure hierarchical protocols is not straightforward. Thus, their verification become a primordial issue in order to avoid the possible security attacks and vulnerabilities. Several attempts have been done to deal with for...

Journal: :CoRR 2012
Noureddine Chikouche Cherif Foudil Mohamed Benmohammed

Radio Frequency Identification (RFID) and biometric technologies saw fast evolutions during the last years and which are used in several applications, such as access control. Among important characteristics in the RFID tags, we mention the limitation of resources (memory, energy, ...). Our work focuses on the design of a RFID authentication protocol which uses biometric data and which confirms ...

Journal: :J. Network and Computer Applications 2014
Wei Xie Lei Xie Chen Zhang Qiang Wang Jian Xu Quan Zhang Chaojing Tang

This paper proposes a novel type of RFID application, i.e., RFID seeking. Several existing types of RFID applications such as monitoring, searching, locating/navigating, are similar with RFID seeking. However, they are either inapplicable or vulnerable for RFID seeking scenarios, in which a user is to find a lost tagged item in a blind spot, or to find a wanted item among a mass of similar ones...

2006
Mathieu Turuani

This paper presents an overview of the CL-Atse tool, an efficient and versatile automatic analyser for the security of cryptographic protocols. CL-Atse takes as input a protocol specified as a set of rewriting rules (IF format, produced by the AVISPA compiler), and uses rewriting and constraint solving techniques to model all reachable states of the participants and decide if an attack exists w...

Journal: :CoRR 2016
Apala Ray Johan Åkerberg Mats Björkman Mikael Gidlund

An efficient key management system is required to support cryptography. Most key management systems use either pre-installed shared keys or install initial security parameters using out-of-band channels. These methods create an additional burden for engineers who manage the devices in industrial plants. Hence, device deployment in industrial plants becomes a challenging task in order to achieve...

Journal: :J. UCS 2007
Zoran Duric Ognjen Maric Dragan Gasevic

Payment systems need to address a number of security issues in order to be an effective and secure means of transferring payments across the Internet. To be accessible to a wider audience, they also need to be easy to use for their end-users (customers and merchants). Trying to address these issues, we created the Internet Payment System (IPS). IPS tries to combine the advantages of several exi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید