scispace - formally typeset
Search or ask a question
Topic

Otway–Rees protocol

About: Otway–Rees protocol is a research topic. Over the lifetime, 1975 publications have been published within this topic receiving 40569 citations.


Papers
More filters
01 Jan 2005
TL;DR: An exercising machine including a vertically disposed framework defined by a pair of parallel, vertical, channel-shaped side members interconnected at their top by a top connecting member and having stabilizing supporting feet extending horizontally at their lower ends to facilitate various optional uses of the exercising machine.
Abstract: An exercising machine including a vertically disposed framework defined by a pair of parallel, vertical, channel-shaped side members interconnected at their top by a top connecting member and having stabilizing supporting feet extending horizontally at their lower ends. The side members support independent slides in the form of inner channels having an inwardly extending arm and an upwardly extending peg thereon for receiving a desired number of barbell weights with a cable and pulley system being associated with the slides to enable independent vertical movement of the slides by pulling downwardly on independent handles or pulling upwardly on independent handles depending upon the manner in which the cable and pulley systems are associated. A locking bar is provided to selectively interconnect the arms on the two slides together with a central pulley system and cable system enabling the two slides and the weights thereon to be lifted by a single cable. The side members include apertures receiving pins to support a barbell assembly or to support the slides in a predetermined elevated rest position and to support one end of a sit-up board. An extension is provided at the top of the framework having a central pulley thereon receiving the cable attached to the locking bar and also providing a support for a heavy punching bag with both the extension and the locking bar including a feature to enable attachment of a handlebar to facilitate various optional uses of the exercising machine. The stabilizing feet at the lower end of the framework are interconnected by a connecting bar having pulleys mounted thereon and also a mounting structure for a T-bar on which weights may be placed to facilitate additional optional uses of the exercising machine.

9 citations

Journal Article
TL;DR: This paper presents the security analysis of a class of interactive deniable authentication protocols and a noninteractive one, focusing on a serial of pairings based protocols proposed by Chou et al and repaired by Lim et al.
Abstract: Deniability enables protocol participants to deny their involvement after they have taken part in a particular protocol run. In this paper, we present the security analysis of a class of interactive deniable authentication protocols and a noninteractive one. For interactive protocols, we focus on a serial of pairings based protocols proposed by Chou et al and repaired by Lim et al. We point out that their repaired protocols are still not secure under Key Compromise Impersonation (KCI) attack and give it an improvement. For noninteractive protocols, we point out that most current noninteractive deniable authentication protocols are not secure under KCI attack.

9 citations

Book ChapterDOI
05 Sep 2014
TL;DR: Take advantage of critical characteristics in information security to classify these attacks, namely confidentiality attack, integrity attack, availability attack, and the prospect of this field in the future comes at last.
Abstract: It has a long history to launch attacks using vulnerability in the network protocols. More and more researchers are attracted to the attack and defenses of network protocols. It will mitigate the severe consequences that attacks may lead to by maliciously using protocol vulnerability if we have reliable protocol design and prompt defenses. In this paper, we review the research progress about attacks based on protocol vulnerability. We take advantage of critical characteristics in information security to classify these attacks, namely confidentiality attack, integrity attack, availability attack. Some challenges confronted by the researchers are discussed in view of current researches. The prospect of this field in the future comes at last.

9 citations

Proceedings ArticleDOI
22 Mar 2011
TL;DR: This paper uses Automatic resend request(ASQ) technique with regular acknowledgement to design reliable end-to-end communication protocol, called Adaptive Reliable Transport(ARTP) protocol, for WSNs and shows that the protocol performs better than related protocols in wireless/wire line networks, in terms of throughput and energy efficiency.
Abstract: There are many wireless sensor network(WSN) applications which require reliable data transfer between the nodes. Several techniques including link level retransmission, error correction methods and hybrid Automatic Repeat re- Quest(ARQ) were introduced into the wireless sensor networks for ensuring reliability. In this paper, we use Automatic resend request(ASQ) technique with regular acknowledgement to design reliable end-to-end communication protocol, called Adaptive Reliable Transport(ARTP) protocol, for WSNs. Besides ensuring reliability, objective of ARTP protocol is to ensure message stream FIFO at the receiver side instead of the byte stream FIFO used in TCP/IP protocol suite. To realize this objective, a new protocol stack has been used in the ARTP protocol. The ARTP protocol saves energy without affecting the throughput by sending three different types of acknowledgements, viz. ACK, NACK and FNACK with semantics different from that existing in the literature currently and adapting to the network conditions. Additionally, the protocol controls flow based on the receiver’s feedback and congestion by holding ACK messages. To the best of our knowledge, there has been little or no attempt to build a receiver controlled regularly acknowledged reliable communication protocol. We have carried out extensive simulation studies of our protocol using Castalia simulator, and the study shows that our protocol performs better than related protocols in wireless/wire line networks, in terms of throughput and energy efficiency.

9 citations

Proceedings ArticleDOI
26 Mar 2012
TL;DR: An ameliorative password-based authentication scheme is proposed in this paper, achieving to resist off-line password guessing attacks, replay attacks, on-line passwords guessing attacks and ID-theft attacks, even over insecure network.
Abstract: Protocols of user authentication are able to ensure the security of data transmission and usersi¦ communication over insecure networks. Among various authenticated mechanisms run currently, the password-based user authentication, because of its efficiency, is the most widely employed in different areas, such as computer networks, wireless networks, remote login, operation systems, and database management systems. Even as password is endowed with the property of simple and human memorable, for which causes such an attack of brute force, for example, the previous works often suffer off-line password guessing attack. Therefore, an ameliorative password-based authentication scheme is proposed in this paper, achieving to resist off-line password guessing attacks, replay attacks, on-line password guessing attacks, and ID-theft attacks. In light of security, the proposed scheme is provided with good practicability, even over insecure network.

9 citations


Network Information
Related Topics (5)
Server
79.5K papers, 1.4M citations
86% related
Encryption
98.3K papers, 1.4M citations
86% related
Wireless ad hoc network
49K papers, 1.1M citations
85% related
Mobile computing
51.3K papers, 1M citations
84% related
Wireless sensor network
142K papers, 2.4M citations
84% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20239
202236
20211
20194
201812
201795