نتایج جستجو برای: avispa

تعداد نتایج: 166  

2011
Ashar Javed

Formal analysis is of importance in order to increase confidence that the protocol satisfies its security requirements. In particular, the results obtained from the formal analysis of the smart card security protocols when smart cards are used as a specific type of Secure Signature Creation Devices (SSCDs) are presented. SSCDs are developed to support the EU-directive on electronic signatures. ...

2014
Neetu Sharma Birendra Kumar Sharma M. A. Stalder M. S. Hwang C. C. Lee

-------------------------------------------------------------------ABSTRACT-----------------------------------------------------Blind signature scheme provide the feature that a user is able to get a signature without giving the actual message to the signer. Many Blind signature schemes have been proposed in which security are based on intractability of factoring or DLP (Discrete Logarithm Prob...

2009
Olivier Heen Gilles Guette Thomas Genet

More and more mobile devices feature wireless communication capabilities. They can self-organize in a mobile ad hoc network in order to communicate and maintain connectivity without any infrastructure component. In this context, some devices may benefit from established trust relations in order to communicate private data. Various solutions already exist for establishing and detecting such trus...

2016
Martin Potthast Christian Forler Eik List Stefan Lucks

This work introduces Passphone, a new smartphone-based authentication scheme that outsources user verification to a trusted third party without sacrificing privacy: neither can the trusted third party learn the relation between users and service providers, nor can service providers learn those of their users to others. When employed as a second factor in conjunction with, for instance, password...

Journal: :JCM 2014
NorazahAbd Aziz Nur Izura Udzir Ramlan Mahmod

Normally, secure communication between client-server applications is established using secure channel technologies such as Transport Layer Security (TLS). TLS is cryptographic protocol which ensures secure transmission of data and authenticity of communication at each endpoint platform. However, the protocol does not provide any trustworthiness assurance of the involved endpoint. This paper inc...

Journal: :I. J. Network Security 2013
H. K. Pathak Manju Sanghi

In 2005, Abdalla and Pointcheval suggested a new variation of the computational DH assumption called chosen based computational Diffie Hellman (CCDH) and presented SPAKE-1 and SPAKE-2 simple password based authenticated key exchange protocols. Since then several three party password authenticated key agreement protocols have been proposed based on CCDH assumption but most of them broken. In thi...

2010
M. Sayad Haghighi

The Session Initiation Protocol (SIP), which is becoming the de facto standard for the next-generation VoIP networks, is currently receiving much attention in many aspects. One aspect that was not deeply addressed in the original SIP is its authentication procedure. Apart from its security, an SIP authentication procedure should be e cient. This paper proposes a robust and e cient three-party S...

Journal: :Wireless Personal Communications 2022

Due to the stringent computational capabilities of low-cost RFID tags, several lightweight secure authentication protocols have been proposed for an RFID-based supply chain using bitwise operations. In this paper, we study vulnerabilities associated with operations by doing cryptanalysis a protocol tags. The like rotation and XOR show that is vulnerable tag, reader, node impersonation attacks. ...

2008
Monika Maidl David von Oheimb Peter Hartmann Richard Robinson

Software distribution to target devices like factory controllers, medical instruments, vehicles or airplanes is increasingly performed electronically over insecure networks. Such software often implements vital functionality, and so the software distribution process can be highly critical, both from the safety and the security perspective. In this paper, we introduce a novel software distributi...

2015
S. Padma

Mobile IPv6, also known as MIPv6, is an IETF standard that has added the roaming capabilities of Mobile Nodes (MNs) in IPv6 network. It allows an MN to move from one network to another without any disruption in communication. The MN registers its current location to the Home Agent (HA) and the Correspondent Node (CN) with the help of a secure Binding Update (BU). Return Routability Protocol (RR...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید