نتایج جستجو برای: avispa
تعداد نتایج: 166 فیلتر نتایج به سال:
Formal analysis is of importance in order to increase confidence that the protocol satisfies its security requirements. In particular, the results obtained from the formal analysis of the smart card security protocols when smart cards are used as a specific type of Secure Signature Creation Devices (SSCDs) are presented. SSCDs are developed to support the EU-directive on electronic signatures. ...
-------------------------------------------------------------------ABSTRACT-----------------------------------------------------Blind signature scheme provide the feature that a user is able to get a signature without giving the actual message to the signer. Many Blind signature schemes have been proposed in which security are based on intractability of factoring or DLP (Discrete Logarithm Prob...
More and more mobile devices feature wireless communication capabilities. They can self-organize in a mobile ad hoc network in order to communicate and maintain connectivity without any infrastructure component. In this context, some devices may benefit from established trust relations in order to communicate private data. Various solutions already exist for establishing and detecting such trus...
This work introduces Passphone, a new smartphone-based authentication scheme that outsources user verification to a trusted third party without sacrificing privacy: neither can the trusted third party learn the relation between users and service providers, nor can service providers learn those of their users to others. When employed as a second factor in conjunction with, for instance, password...
Normally, secure communication between client-server applications is established using secure channel technologies such as Transport Layer Security (TLS). TLS is cryptographic protocol which ensures secure transmission of data and authenticity of communication at each endpoint platform. However, the protocol does not provide any trustworthiness assurance of the involved endpoint. This paper inc...
In 2005, Abdalla and Pointcheval suggested a new variation of the computational DH assumption called chosen based computational Diffie Hellman (CCDH) and presented SPAKE-1 and SPAKE-2 simple password based authenticated key exchange protocols. Since then several three party password authenticated key agreement protocols have been proposed based on CCDH assumption but most of them broken. In thi...
The Session Initiation Protocol (SIP), which is becoming the de facto standard for the next-generation VoIP networks, is currently receiving much attention in many aspects. One aspect that was not deeply addressed in the original SIP is its authentication procedure. Apart from its security, an SIP authentication procedure should be e cient. This paper proposes a robust and e cient three-party S...
Due to the stringent computational capabilities of low-cost RFID tags, several lightweight secure authentication protocols have been proposed for an RFID-based supply chain using bitwise operations. In this paper, we study vulnerabilities associated with operations by doing cryptanalysis a protocol tags. The like rotation and XOR show that is vulnerable tag, reader, node impersonation attacks. ...
Software distribution to target devices like factory controllers, medical instruments, vehicles or airplanes is increasingly performed electronically over insecure networks. Such software often implements vital functionality, and so the software distribution process can be highly critical, both from the safety and the security perspective. In this paper, we introduce a novel software distributi...
Mobile IPv6, also known as MIPv6, is an IETF standard that has added the roaming capabilities of Mobile Nodes (MNs) in IPv6 network. It allows an MN to move from one network to another without any disruption in communication. The MN registers its current location to the Home Agent (HA) and the Correspondent Node (CN) with the help of a secure Binding Update (BU). Return Routability Protocol (RR...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید