Sciweavers

464 search results - page 1 / 93
» Validating Attacks on Authentication Protocols
Sort
View
JSW
2008
118views more  JSW 2008»
13 years 4 months ago
Deciding the Correctness of Attacks on Authentication Protocols
A new tool for automated validation of attacks on authentication protocols has been used to find several errors and ambiguities in the list of attacks described in the well known r...
Anders Moen Hagalisletto
ISCC
2007
IEEE
13 years 11 months ago
Validating Attacks on Authentication Protocols
— It is possible to show that well-known attacks on authentication protocols are flawed. This is a problem, since good protocols may thus be dismissed rather than improved and p...
Anders Moen Hagalisletto
IEEEARES
2007
IEEE
13 years 11 months ago
Errors in Attacks on Authentication Protocols
A tool for automated validation of attacks on authentication protocols has been used to find several flaws and ambiguities in the list of attacks described in the well known rep...
Anders Moen Hagalisletto
CORR
2010
Springer
56views Education» more  CORR 2010»
13 years 5 months ago
An attack on MySQL's login protocol
The MySQL challenge
Ivan Arce, Emiliano Kargieman, Gerardo Richarte, C...
CASES
2010
ACM
13 years 2 months ago
Low cost multicast authentication via validity voting in time-triggered embedded control networks
Wired embedded networks must include multicast authentication to prevent masquerade attacks within the network. However, unique constraints for these networks make most existing m...
Christopher Szilagyi, Philip Koopman