Topic
Otway–Rees protocol
About: Otway–Rees protocol is a research topic. Over the lifetime, 1975 publications have been published within this topic receiving 40569 citations.
Papers published on a yearly basis
Papers
More filters
•
TL;DR: A novel authentication protocol based on CDMA and Hash function can tackle with the problem of tag collisions and resist several possible attacks, including reply, tracking, blocking, proofing, and inner attacks.
Abstract: In this paper, a novel authentication protocol based on CDMA and Hash function is presented. The new protocol can tackle with the problem of tag collisions and resist several possible attacks, including reply, tracking, blocking, proofing, and inner attacks. Both theory and analysis show that the new protocol, compared with other authentication protocols, improves the security of RFID systems effectively and does not increase the complexity of protocol.
2 citations
••
01 May 2017TL;DR: A new authentication protocols is proposed based on asymmetric key encryption functions that meets to security requirement of the third generation mobile communication, but also improves the insufficient security of the published authentication protocol.
Abstract: In this paper, a new authentication protocols is proposed based on asymmetric key encryption functions. Through analysis, the improved protocol not only meets to security requirement of the third generation mobile communication, but also improves the insufficient security of the published authentication protocol.
2 citations
01 Jan 2006
TL;DR: This work formally specified the Kerberos-One-Time protocol using Object-Z and then analysed its behaviour in the presence of an attacker using the symbolic analysis laboratory's model checker, which confirmed suspicions about the protocol's weakness.
Abstract: The Kerberos-One-Time Protocol is a key distribution protocol promoted for use with Javacards to provide secure communication over the GSM mobile phone network. From inspection we suspected a replay attack was possible on the protocol. To check this, we formally specified the protocol using Object-Z and then analysed its behaviour in the presence of an attacker using the Symbolic Analysis Laboratory’s model checker. To produce accurate results efficiently, our formalism included an abstraction of the protocol’s data structures that captured just those characteristics that we believed made the protocol vulnerable. Ultimately, the model checker’s analysis confirmed our suspicions about the protocol’s weakness.
2 citations
••
06 Oct 2009TL;DR: The Bilinear pairing based mutual authentication and key agreement protocol for DTV broadcast encryption is presented and is resilient to replay, forgery, man-in-the-middle and insider attacks and the security analysis for it is provided.
Abstract: Bilinear pairing based mutual authentication and key agreement protocol for DTV broadcast encryption is presented in this paper. The protocol facilitates key agreement with lesser communication between set-top box and smart card with forward secrecy and is resilient to replay, forgery, man-in-the-middle and insider attacks and we provide the security analysis for it. The protocol is especially attractive for conditional access system including gaming, betting, shopping and banking services and where the user' smart card have low computational power. The protocol also provides flexible password change option to the users.
2 citations
••
01 Jan 2008TL;DR: Hanna, Youssef Wasfy, "Verifying sensor network security protocol implementations" (2008).
Abstract: Hanna, Youssef Wasfy, "Verifying sensor network security protocol implementations" (2008). Graduate Theses and Dissertations. Paper 11171.
2 citations