scispace - formally typeset
Search or ask a question
Topic

Otway–Rees protocol

About: Otway–Rees protocol is a research topic. Over the lifetime, 1975 publications have been published within this topic receiving 40569 citations.


Papers
More filters
Proceedings ArticleDOI
27 Jun 2005
TL;DR: A new secure charging-protocol, the polynomial-assisted charging protocol, that is able to provide strict guarantees of cooperative behavior in traffic forwarding, with minimal network overhead is introduced.
Abstract: The area of trustworthy charging in self-organized environments has been developed quite recently. This paper introduces a new secure charging-protocol, the polynomial-assisted charging protocol, for these environments. The protocol relies on polynomial composition for speeding the identification process in small groups. This protocol is able to provide strict guarantees of cooperative behavior in traffic forwarding, with minimal network overhead. Protocol performance is evaluated in multiple ad-hoc environments and results are compared with previously proposed work. The performance results show the merits of this protocol in multiple types of environments.

5 citations

Book ChapterDOI
01 Jan 2014
TL;DR: A new authentication protocol based on LTE network to secure the NFC and enhances the security level provided by the LTE, which will resolve the security of the new LTE system.
Abstract: NFC (Near Field Communication) has a good adaptable structure that it can be easily combined with any wireless network. Since NFC can be used to communicate without using a proper wire, all the transactions can be done remotely without any physical connections. In this paper, we propose a new authentication protocol based on LTE network to secure the NFC. Our protocol enhances the security level provided by the LTE. Our approach is new in a sense that it covers LTE in contrast to old networks like GSM & 3G substantially treated in the literature. Moreover, both GSM and 3G have several drawbacks when they are combined with the NFC technology, which has potential weakness in confidentiality, integrity, and authentication. Hence our new approach will resolve the security of the new LTE system. We expect that our protocol will result in new secure applications for the smart phone markets.

5 citations

Proceedings ArticleDOI
18 Nov 2009
TL;DR: A mutual authentication key agreement protocol based on CPK technology and the improved Elliptic Curve Diffie-Hellman key agreement is proposed, which has advantages over other protocols in its security.
Abstract: Authentication and key agreement protocol is designed to provide pair of parties communicating over an insecure network with a secure session key. However, most of the existing authenticated key agreement protocols are not designed for protecting privacy. A mutual authentication key agreement protocol based on CPK technology and the improved Elliptic Curve Diffie-Hellman key agreement is proposed. The protocol has advantages over other protocols in its security.

5 citations

Proceedings ArticleDOI
26 Aug 2006
TL;DR: This paper is concerned with the particular case of the discrete squaring function which offers more computational advantages since the elements of the one-way chains may be efficiently computed in a time-memory trade.
Abstract: The Delayed Message Authentication Protocol (DeMA protocol) is a protocol that can be used in order to exchange authentic information between two entities by using a one-way chain (i.e. an array of elements generated by a one-way function) on each entity’s side. The use of the discrete power function in the DeMA protocol offers the advantage that the length of the chains does not influence the computational time. In this paper we are concerned with the particular case of the discrete squaring function which offers more computational advantages since the elements of the one-way chains may be efficiently computed in a time-memory trade. The complete description of the DeMA protocol in the case of the discrete squaring function is given and also some experimental results are presented which help on understanding the computational performance of the protocol. By using this implementation of the DeMA protocol message authentication can be assured at the cost of almost one modular multiplication for each exchanged message.

5 citations

Book ChapterDOI
03 Sep 2010
TL;DR: A new Syntax-based Security Testing (SST) framework that uses a protocol specification to perform security testing on text-based communication protocols and is demonstrated using a toy Web application and an open source application.
Abstract: We introduce a new Syntax-based Security Testing (SST) framework that uses a protocol specification to perform security testing on text-based communication protocols. A protocol specification of a particular text-based protocol under-tested represents its syntactic grammar and static constraints. The specification is used to generate test cases by mutating valid messages, breaking the syntactic and constraints of the protocol. The framework is demonstrated using a toy Web application and the open source application KOrganizer.

5 citations


Network Information
Related Topics (5)
Server
79.5K papers, 1.4M citations
86% related
Encryption
98.3K papers, 1.4M citations
86% related
Wireless ad hoc network
49K papers, 1.1M citations
85% related
Mobile computing
51.3K papers, 1M citations
84% related
Wireless sensor network
142K papers, 2.4M citations
84% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20239
202236
20211
20194
201812
201795