Sciweavers

51 search results - page 2 / 11
» Analysing a Stream Authentication Protocol Using Model Check...
Sort
View
CANS
2006
Springer
114views Cryptology» more  CANS 2006»
13 years 10 months ago
Achieving Multicast Stream Authentication Using MDS Codes
We address the multicast stream authentication problem when the communication channel is under the control of an opponent who can drop, reorder or inject data. In such a network m...
Christophe Tartary, Huaxiong Wang
CSFW
2007
IEEE
14 years 23 days ago
LTL Model Checking for Security Protocols
Most model checking techniques for security protocols make a number of simplifying assumptions on the protocol and/or on its execution environment that prevent their applicability...
Alessandro Armando, Roberto Carbone, Luca Compagna
CIS
2007
Springer
14 years 18 days ago
A New Provably Secure Authentication and Key Agreement Mechanism for SIP Using Certificateless Public-Key Cryptography
The session initiation protocol (SIP) is considered as the dominant signaling protocol for calls over the internet. However, SIP authentication typically uses HTTP digest authentic...
Fengjiao Wang, Yuqing Zhang
AFRICACRYPT
2009
Springer
14 years 1 months ago
Security Analysis of Standard Authentication and Key Agreement Protocols Utilising Timestamps
We propose a generic modelling technique that can be used to extend existing frameworks for theoretical security analysis in order to capture the use of timestamps. We apply this t...
Manuel Barbosa, Pooya Farshim
CANS
2009
Springer
126views Cryptology» more  CANS 2009»
14 years 1 months ago
Ensuring Authentication of Digital Information Using Cryptographic Accumulators
In this paper, we study the broadcast authentication problem for both erasure and adversarial networks. Two important concerns for authentication protocols are the authentication ...
Christophe Tartary