scispace - formally typeset
Search or ask a question
Topic

Otway–Rees protocol

About: Otway–Rees protocol is a research topic. Over the lifetime, 1975 publications have been published within this topic receiving 40569 citations.


Papers
More filters
Journal Article
Zhou Li-hua1
TL;DR: A low cost anonymous authentication protocol for RFID was proposed based on the universally composable security mode and was proven secure in the standard model.
Abstract: Safety requirements for RFID protocols were analyzed,and a low cost anonymous authentication protocol for RFID was proposed based on the universally composable security mode.The protocol was proven secure in the standard model.The new protocol provides anonymity,mutual authentication and concurrent security,and its implementation is feasible for a wide range of RFID architectures.

4 citations

Proceedings ArticleDOI
16 Apr 2010
TL;DR: Security analysis shows the new secure certificateless authentication and key agreement protocol is so suitable in one domain and across domain that it is fit for the hybrid P2P network.
Abstract: In order to ensure authentication and confidentiality of E-Commerce and other applications in the P2P network, a new secure certificateless authentication and key agreement protocol is proposed. In this paper, it shows the new protocol is so suitable in one domain and across domain that it is fit for the hybrid P2P network. Security analysis shows that it achieves almost known security attributes, such as implicit key authentication, perfect forward secrecy, known-key secrecy, key-compromise impersonation, unknown key-share resilience, known session-specific temporary information security and no key control. Moreover, our proposed protocol is of great practical and efficiency for the hybrid P2P network.

4 citations

Proceedings Article
01 Jan 2009
TL;DR: An authentication protocol, Ad-hoc On Demand Authentication Chain Protocol (AOAC), which allow individual node to authenticate each other and to establish a shared key for secure peer-to-peer communication, the authentication does not rely on any centralize trusted authority or fixed server and is not based on public key cryptography.

4 citations

01 Jan 2003
TL;DR: In G-SNAP, the authentication procedure and network access control is handled by a quorum of authentication centres, and the advantages of the novel protocol include increased security, availability and distributed trust.
Abstract: Networks access control is a crucial topic and authentication is a pre-requisite of that process. Most existing authentication protocols (for example that used in the GSM mobile network) are centralised. Depending on a single entity is undesirable as it has security, trust and availability issues. This paper proposes a new protocol, GSM-secure network access protocol (G-SNAP). In G-SNAP, the authentication procedure and network access control is handled by a quorum of authentication centres. The advantages of the novel protocol include increased security, availability and distributed trust.

4 citations

Patent
08 Jan 2016
TL;DR: In this article, the authors propose a secure remote authentication of a computing device over a network that uses a communications protocol which does not require use of an address, and on which one or more authentication servers are listening.
Abstract: A method for secure remote authentication of a computing device over a network that uses a communications protocol which does not require use of an address, and on which one or more authentication servers are listening, comprising the steps of broadcasting a unique identifier over the network; accepting a request over the network from one of the one or more authorization servers to initiate an authentication protocol; responding to the request; receiving data necessary to complete a boot process; and completing a boot process using the received data.

4 citations


Network Information
Related Topics (5)
Server
79.5K papers, 1.4M citations
86% related
Encryption
98.3K papers, 1.4M citations
86% related
Wireless ad hoc network
49K papers, 1.1M citations
85% related
Mobile computing
51.3K papers, 1M citations
84% related
Wireless sensor network
142K papers, 2.4M citations
84% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20239
202236
20211
20194
201812
201795