نتایج جستجو برای: strand protocol
تعداد نتایج: 284992 فیلتر نتایج به سال:
The 5th generation mobile communication technology (5G) authentication and key management (AKA) protocol specified by the 3rd partnership project (3GPP) includes three cases because it introduces synchronization failure message code (MAC) procedures. Thus, there may be interactions between these cases, forming vulnerabilities that do not exist in any single case. However, this is fully consider...
Due to the very limited computing resource, storing space and electric power supply of tag, it is a great challenge for us to design a practical RFID protocol which is security, efficient and can be used in the low-cost tag. In 2007, He et al. proposed an authentication and key agreement protocol which is used in the process of communication between the low-cost tag and reader. They also proved...
A new method is described to enrich genomic libraries for clones containing microsatellite repeats. The method involves selection on completed M13 genomic libraries rather than on genomic DNA before library construction. It uses two reactions, in which microsatellite oligonucleotides prime strand extension. The first reaction uses a biotinylated primer allowing vectors with microsatellite-conta...
In this paper, we first present a concrete formal protocol design approach, which is based on authentication tests, to create an Efficient and Secure Internet Key Exchange (ESIKE) protocol. Then we formally prove the secure properties of ESIKE with strand space model and authentication tests. The ESIKE protocol overcomes the security shortages of the Internet Key Exchange (IKE), and can provide...
Cloud Computing, as an emerging, virtual, large-scale distributed computing model, has gained increasing attention these years. Meanwhile it also faces many secure challenges, one of which is authentication. In this paper, we firstly analyze a user authentication framework for cloud computing proposed by Amlan Jyoti Choudhury et al and point out the security attacks existing in the protocol. Th...
Roaming in wireless mesh networks (WMNs) requires that mobile nodes complete access authentication fast while protecting the identities of mobile nodes. In this paper, after analyzing some current authentication protocols for roaming in wireless mesh networks, we propose a new protocol based on multi-signature and three-party key agreement with a zone-based hierarchical network topology and pro...
We describe a protocol design process, and illustrate its use by creating atspect, an Authentication Test-based Secure Protocol for Electronic Commerce Transactions. The design process is organized around the authentication tests, a method for protocol verification based on the strand space theory. The authentication tests dictate how randomly generated values such as nonces may be combined wit...
Strand space analysis [13, 12] is a method for stating and proving correctness properties for cryptographic protocols. In this paper we apply the same method to the related problem of mixed protocols, and show that a protocol can remain correct even when used in combination with a range of other protocols. We illustrate the method with the familiar OtwayRees [10, 1] protocol. We identify a simp...
Many security protocols are built as the composition of an applicationlayer protocol and a secure transport protocol, such as TLS. There are many approaches to proving the correctness of such protocols. One popular approach is verification by abstraction, in which the correctness of the application-layer protocol is proven under the assumption that the transport layer satisfies certain properti...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید