scispace - formally typeset
Search or ask a question
Topic

Otway–Rees protocol

About: Otway–Rees protocol is a research topic. Over the lifetime, 1975 publications have been published within this topic receiving 40569 citations.


Papers
More filters
Journal Article
TL;DR: A novel authentication protocol based on CDMA and Hash function can tackle with the problem of tag collisions and resist several possible attacks, including reply, tracking, blocking, proofing, and inner attacks.
Abstract: In this paper, a novel authentication protocol based on CDMA and Hash function is presented. The new protocol can tackle with the problem of tag collisions and resist several possible attacks, including reply, tracking, blocking, proofing, and inner attacks. Both theory and analysis show that the new protocol, compared with other authentication protocols, improves the security of RFID systems effectively and does not increase the complexity of protocol.

2 citations

Proceedings ArticleDOI
01 May 2017
TL;DR: A new authentication protocols is proposed based on asymmetric key encryption functions that meets to security requirement of the third generation mobile communication, but also improves the insufficient security of the published authentication protocol.
Abstract: In this paper, a new authentication protocols is proposed based on asymmetric key encryption functions. Through analysis, the improved protocol not only meets to security requirement of the third generation mobile communication, but also improves the insufficient security of the published authentication protocol.

2 citations

01 Jan 2006
TL;DR: This work formally specified the Kerberos-One-Time protocol using Object-Z and then analysed its behaviour in the presence of an attacker using the symbolic analysis laboratory's model checker, which confirmed suspicions about the protocol's weakness.
Abstract: The Kerberos-One-Time Protocol is a key distribution protocol promoted for use with Javacards to provide secure communication over the GSM mobile phone network. From inspection we suspected a replay attack was possible on the protocol. To check this, we formally specified the protocol using Object-Z and then analysed its behaviour in the presence of an attacker using the Symbolic Analysis Laboratory’s model checker. To produce accurate results efficiently, our formalism included an abstraction of the protocol’s data structures that captured just those characteristics that we believed made the protocol vulnerable. Ultimately, the model checker’s analysis confirmed our suspicions about the protocol’s weakness.

2 citations

Proceedings ArticleDOI
Ashutosh Saxena1
06 Oct 2009
TL;DR: The Bilinear pairing based mutual authentication and key agreement protocol for DTV broadcast encryption is presented and is resilient to replay, forgery, man-in-the-middle and insider attacks and the security analysis for it is provided.
Abstract: Bilinear pairing based mutual authentication and key agreement protocol for DTV broadcast encryption is presented in this paper. The protocol facilitates key agreement with lesser communication between set-top box and smart card with forward secrecy and is resilient to replay, forgery, man-in-the-middle and insider attacks and we provide the security analysis for it. The protocol is especially attractive for conditional access system including gaming, betting, shopping and banking services and where the user' smart card have low computational power. The protocol also provides flexible password change option to the users.

2 citations

DissertationDOI
01 Jan 2008
TL;DR: Hanna, Youssef Wasfy, "Verifying sensor network security protocol implementations" (2008).
Abstract: Hanna, Youssef Wasfy, "Verifying sensor network security protocol implementations" (2008). Graduate Theses and Dissertations. Paper 11171.

2 citations


Network Information
Related Topics (5)
Server
79.5K papers, 1.4M citations
86% related
Encryption
98.3K papers, 1.4M citations
86% related
Wireless ad hoc network
49K papers, 1.1M citations
85% related
Mobile computing
51.3K papers, 1M citations
84% related
Wireless sensor network
142K papers, 2.4M citations
84% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20239
202236
20211
20194
201812
201795