Sciweavers

3115 search results - page 90 / 623
» Synthesizing Secure Protocols
Sort
View
ISW
2009
Springer
15 years 4 months ago
Security Analysis of the PACE Key-Agreement Protocol
We analyze the Password Authenticated Connection Establishment (PACE) protocol for authenticated key agreement, recently proposed by the German Federal Office for Information Secur...
Jens Bender, Marc Fischlin, Dennis Kügler
ACISP
1998
Springer
15 years 2 months ago
LITESET: A Light-Weight Secure Electronic Transaction Protocol
Abstract. The past few years have seen the emergence of a large number of proposals for electronic payments over open networks. Among these proposals is the Secure Electronic Trans...
Goichiro Hanaoka, Yuliang Zheng, Hideki Imai
CISIS
2009
IEEE
15 years 4 months ago
A Security Layer for JXTA Core Protocols
— JXTA defines a set of six core protocols specifically suited for ad hoc, pervasive, multi-hop, peer-to-peer (P2P) computing. These protocols allow peers to cooperate and form...
Joan Arnedo-Moreno, Jordi Herrera-Joancomart&iacut...
CORR
2010
Springer
102views Education» more  CORR 2010»
14 years 10 months ago
How to prevent type-flaw and multi-protocol attacks on security protocols under Exclusive-OR
Type-flaw attacks and multi-protocol attacks on security protocols have been frequently reported in the literature. Heather et al. and Guttman et al. proved that these could be pr...
Sreekanth Malladi
CORR
2010
Springer
84views Education» more  CORR 2010»
14 years 10 months ago
On the Security of Non-Linear HB (NLHB) Protocol Against Passive Attack
As a variant of the HB authentication protocol for RFID systems, which relies on the complexity of decoding linear codes against passive attacks, Madhavan et al. presented Non-Line...
Mohammad Reza Sohizadeh Abyaneh