scispace - formally typeset
Search or ask a question

Showing papers on "Otway–Rees protocol published in 1992"


Journal ArticleDOI
TL;DR: A simple, efficient protocol referred to as the station-to-station (STS) protocol is introduced, examined in detail, and considered in relation to existing protocols.
Abstract: We discuss two-party mutual authentication protocols providing authenticated key exchange, focusing on those using asymmetric techniques. A simple, efficient protocol referred to as the station-to-station (STS) protocol is introduced, examined in detail, and considered in relation to existing protocols. The definition of a secure protocol is considered, and desirable characteristics of secure protocols are discussed.

1,270 citations


01 Oct 1992
TL;DR: The Point- to-Point Protocol provides a standard method of encapsulating Network Layer protocol information over point-to-point links and defines an extensible Link Control Protocol which allows negotiation of an Authentication Protocol for authenticating its peer before allowing Network Layer protocols to transmit over the link.
Abstract: The Point-to-Point Protocol (PPP) [1] provides a standard method of encapsulating Network Layer protocol information over point-to-point links. PPP also defines an extensible Link Control Protocol, which allows negotiation of an Authentication Protocol for authenticating its peer before allowing Network Layer protocols to transmit over the link.

93 citations


Proceedings ArticleDOI
03 Feb 1992
TL;DR: The authors examine a priority-driven locking protocol called integrated real-time locking protocol, which is free of deadlock, and in addition, a high-priority transaction is not blocked by uncommitted lower priority transactions.
Abstract: The authors examine a priority-driven locking protocol called integrated real-time locking protocol. They show that this protocol is free of deadlock, and in addition, a high-priority transaction is not blocked by uncommitted lower protocol. They show that this protocol is free of deadlock, and in addition, a high-priority transaction is not blocked by uncommitted lower priority transactions. The protocol does not assume any knowledge about the data requirements or the execution time of each transaction. This makes the protocol widely applicable, since in many actual environments such information may not be readily available. Using a database prototyping environment, it was shown that the proposed protocol offers a performance improvement over the two-phase locking protocol. >

48 citations


Journal ArticleDOI
TL;DR: A new protocol is proposed as a combination of the two techniques for system authentication via a password, which establishes a new approach which is quite effective in the case of system-to-system authentication.

8 citations


Proceedings ArticleDOI
08 Apr 1992
TL;DR: A heuristic protocol, that no clear text copy of a password need ever be stored or exchanged across the network under the proposed protocol, as an alternative approach to the authentication problem.
Abstract: Networking has brought about the potential of distributed applications to the user. Typically in such applications there are several different interacting processes that run in multiple hosts and communicate across the network for exchanging data and exercising control. Authentication is an intrinsic activity in the context of distributed applications. A server process has to authenticate a client process, possibly running on another network, prior to granting service to that client. A password in clear text might be sent across the network for this purpose, thus endangering the system security. We propose a heuristic protocol, as an alternative approach to the authentication problem. One important characteristic of our protocol is that its success can only be asserted in a probabilistic manner, nevertheless its probability of success, in any given authentication session, can be arbitrarily increased. The major advantage, however, is that no clear text copy of a password need ever be stored or exchanged across the network under the proposed protocol.