Sciweavers

319 search results - page 3 / 64
» Identification Protocols Secure against Reset Attacks
Sort
View
CORR
2010
Springer
84views Education» more  CORR 2010»
13 years 6 months ago
On the Security of Non-Linear HB (NLHB) Protocol Against Passive Attack
As a variant of the HB authentication protocol for RFID systems, which relies on the complexity of decoding linear codes against passive attacks, Madhavan et al. presented Non-Line...
Mohammad Reza Sohizadeh Abyaneh
CCS
2005
ACM
13 years 11 months ago
Deciding security of protocols against off-line guessing attacks
We provide an effective procedure for deciding the existence of off-line guessing attacks on security protocols, for a bounded number of sessions. The procedure consists of a co...
Mathieu Baudet
WIMOB
2007
IEEE
14 years 16 days ago
A New Protocol for Securing Wireless Sensor Networks against Nodes Replication Attacks
—The low-cost, unattended nature and the capability of self-organizing of sensors, yield the use of Wireless Sensor Networks (WSN) very popular to day. Unfortunately, the unshiel...
Chakib Bekara, Maryline Laurent-Maknavicius
CSFW
2005
IEEE
13 years 12 months ago
Reconstruction of Attacks against Cryptographic Protocols
We study an automatic technique for the verification of cryptographic protocols based on a Horn clause model of the protocol. This technique yields proofs valid for an unbounded ...
Xavier Allamigeon, Bruno Blanchet
ISCC
2002
IEEE
13 years 11 months ago
An active security protocol against DoS attacks
Domenico Cotroneo, L. Peluso, Simon Pietro Romano,...