Sciweavers

860 search results - page 41 / 172
» Uncovering Attacks on Security Protocols
Sort
View
ICALP
2004
Springer
15 years 3 months ago
Deciding Knowledge in Security Protocols Under Equational Theories
The analysis of security protocols requires precise formulations of the knowledge of protocol participants and attackers. In formal approaches, this knowledge is often treated in t...
Martín Abadi, Véronique Cortier
CARDIS
2008
Springer
106views Hardware» more  CARDIS 2008»
14 years 12 months ago
Secure Implementation of the Stern Authentication and Signature Schemes for Low-Resource Devices
Abstract. In this paper we describe the first implementation on smartcard of the code-based authentication protocol proposed by Stern at Crypto'93 and we give a securization o...
Pierre-Louis Cayrel, Philippe Gaborit, Emmanuel Pr...
WWW
2009
ACM
15 years 10 months ago
PAKE-based mutual HTTP authentication for preventing phishing attacks
We developed a new Web authentication protocol with passwordbased mutual authentication which prevents various kinds of phishing attacks. This protocol provides a protection of us...
Yutaka Oiwa, Hiromitsu Takagi, Hajime Watanabe, Hi...
ICALP
2004
Springer
15 years 3 months ago
Group Spreading: A Protocol for Provably Secure Distributed Name Service
In order to enable communication between a dynamic collection of peers with given ID’s, such as “machine.cs.school.edu”, over the Internet, a distributed name service must b...
Baruch Awerbuch, Christian Scheideler
ACSAC
2004
IEEE
15 years 1 months ago
Vulnerabilities and Security Threats in Structured Overlay Networks: A Quantitative Analysis
1 A number of recent applications have been built on distributed hash tables (DHTs) based overlay networks. Almost all DHT-based schemes employ a tight deterministic data placement...
Mudhakar Srivatsa, Ling Liu