scispace - formally typeset
Search or ask a question
Topic

Otway–Rees protocol

About: Otway–Rees protocol is a research topic. Over the lifetime, 1975 publications have been published within this topic receiving 40569 citations.


Papers
More filters
Book ChapterDOI
TL;DR: It is argued that despite the security of PING against weak adversaries, the natural vulnerability of this protocol can be exploited by a weak adversary to launch a denial of service attack against any computer that hosts the protocol.
Abstract: We present a formal specification of the PING protocol, and use three concepts of convergence theory, namely closure, convergence, and protection, to show that this protocol is secure against weak adversaries (and insecure against strong ones) We then argue that despite the security of PING against weak adversaries, the natural vulnerability of this protocol (or of any other protocol for that matter) can be exploited by a weak adversary to launch a denial of service attack against any computer that hosts the protocol Finally, we discuss three mechanisms, namely ingress filtering, hop integrity, and soft firewalls that can be used to prevent denial of service attacks in the Internet

1 citations

01 Jan 2005
TL;DR: Based on the improved RADIUS protocol,AAA (authentication, authority and account) architecture was set up for the Internet service providers and does not increase the complexity of the communication systems, and is simple and easy to implement.
Abstract: By analyzing the principle of remote authentication dial in user service (RADIUS) protocol and the applied security algorithm, an improved RADIUS protocol was proposed to enhance the security performance of networks.Based on the improved protocol,AAA (authentication,authority and account) architecture was set up for the Internet service providers.The AAA architecture for wireless gateway does not increase the complexity of the communication systems, and is simple and easy to implement.

1 citations

Proceedings ArticleDOI
01 Nov 2014
TL;DR: In this paper, the authors proposed an authentication protocol based on multi-level security virtual desktops for cross-domain access and dynamic authentication in the multi-layer security virtual desktop.
Abstract: In order to address the problems of cross domain access and dynamic authentication in the multi-level security virtual desktops, this paper proposes a authentication protocol based on multi-level security virtual desktops Firstly, the user behavior authentication mechanism is introduced into the protocol It could achieve the legitimacy of the dynamic authentication of user behavior and improve the flexibility and security of protocol Secondly, the protocol uses digital signature based on elliptic curve cryptography Symmetric encryption algorithm is used to reduce the computational complexity of it The large integer inverse operation is eliminated in the signature equation, which guarantees the safety grade of the signature while improves its efficiency Finally, the security of authentication protocol is proved by BAN logic

1 citations

01 Dec 2009
TL;DR: Three-party password authenticated key exchange protocol is capable of reducing the number of required keys stored by users in a conference but still cannot resist man-in-the-middle attacks and online dictionary attacks.
Abstract: Three-party password authenticated key exchange (3PAKE) protocol is capable of reducing the number of required keys stored by users in a conference. In 2007, Lu and Cao proposed a simple three-party password authenticated key exchange (S-3PAKE) protocol for assisting users to complete business negotiations and agreements during a communication process without requiring a public server key, and the S-3PAKE protocol can resist all known attacks. However, in 2008, Cuo et al. pointed out the protocol proposed by Lu et al. still cannot resist man-in-the-middle attacks and online dictionary attacks thus further proposed an improved solution as follows. Two parties execute the 2-PAKE protocol to obtain an agreement key first, so that when they execute the 3PAKE protocol, they can authenticate the real identity with each other. An effective three-party password authenticated key exchange (3PAKE) protocol was proposed for authenticating the real identity of both parties without requiring an execution of the 2-PAKE protocol to obtain the agreement key first, but simply adding the real identity of the opposite party in the communication

1 citations


Network Information
Related Topics (5)
Server
79.5K papers, 1.4M citations
86% related
Encryption
98.3K papers, 1.4M citations
86% related
Wireless ad hoc network
49K papers, 1.1M citations
85% related
Mobile computing
51.3K papers, 1M citations
84% related
Wireless sensor network
142K papers, 2.4M citations
84% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20239
202236
20211
20194
201812
201795