Open Access
A Survey of Authentication Protocol Literature
About:
The article was published on 2010-01-01 and is currently open access. It has received 152 citations till now. The article focuses on the topics: Authentication protocol & Lightweight Extensible Authentication Protocol.read more
Citations
More filters
Journal ArticleDOI
Automatic verification of correspondences for security protocols
TL;DR: In this paper, the authors present a technique for verifying correspondences in security protocols, which can handle an unbounded number of sessions of the protocol, and it is efficient in practice.
Patent
Dual-interface key management
TL;DR: In this paper, the challenge-response authentication interaction is based at least in part on the stored key-management information, and the device is configured to prevent data in the protected portion of the memory from being modified in response to information received via the first interface.
Book ChapterDOI
Automatic Verification of Privacy Properties in the Applied pi Calculus
TL;DR: This work develops a formal method verification technique for cryptographic protocols that focuses on proving observational equivalences of the kind P ∼ Q, where the processes P and Q have the same structure and differ only in the choice of terms.
Proceedings ArticleDOI
Untraceability of RFID protocols
TL;DR: An intuitive formal definition of untraceability is given of the standard Dolev-Yao intruder model and a previously unknown attack on a publishedRFID protocol is shown and the framework to prove that the protocol is notuntraceable is used.
Book ChapterDOI
Comparing State Spaces in Automatic Security Protocol Analysis
TL;DR: The study of state space relations is applied in a performance comparison of several well-known automatic tools for security protocol analysis, using the same protocol description and exploring the same state space to effectively compare these automatic tools.
References
More filters
Journal ArticleDOI
New Directions in Cryptography
TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Journal ArticleDOI
A method for obtaining digital signatures and public-key cryptosystems
TL;DR: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
Journal ArticleDOI
Using encryption for authentication in large networks of computers
TL;DR: Use of encryption to achieve authenticated communication in computer networks is discussed and example protocols are presented for the establishment of authenticated connections, for the management of authenticated mail, and for signature verification and document integrity guarantee.
Journal ArticleDOI
A logic of authentication
TL;DR: This paper describes the beliefs of trustworthy parties involved in authentication protocols and the evolution of these beliefs as a consequence of communication, and gives the results of the analysis of four published protocols.
Book
Cryptography and data security
TL;DR: The goal of this book is to introduce the mathematical principles of data security and to show how these principles apply to operating systems, database systems, and computer networks.