نتایج جستجو برای: authentication protocol

تعداد نتایج: 275892  

2014
Minghui Wang Junhua Pan

To the problem of many recently proposed RFID authentication protocol was soon find security holes, we analyzed the main reason, which is that protocol design is not rigorous, and the correctness of the protocol cannot be guaranteed. To this end, authentication test method was adopted in the process of the formal analysis and strict proof to the proposed RFID protocol in this paper. Authenticat...

2013
Il-Soo Jeon Eun-Jun Yoon

Since Low-cost RFID tags have very limited hardware resources, it is difficult to implement an authentication protocol which uses heavy operations such as modern ciphers or hash functions. It has been presented some ultra-lightweight RFID authentication protocols for low-cost RFID tags by using very light operations. Recently, Jeon and Yoon proposed a new ultra-lightweight RFID authentication p...

1998
Scott D. Stoller

Authentication protocols (including protocols that provide key establishment) are designed to work correctly in the presence of an adversary that can (1) perform an unbounded number of encryptions and tuplings while fabricating messages, and (2) prompt honest principals to engage in an unbounded number of concurrent runs of the protocol. The amount of local state maintained by a single run of a...

Journal: :CoRR 2010
Mu'awya Naser Pedro Peris-Lopez Mohammd Rafie Jan C. A. van der Lubbe

In this paper, we analyze the security of an RFID authentication protocol proposed by Liu and Bailey [1], called Privacy and Authentication Protocol (PAP), and show its vulnerabilities and faulty assumptions. PAP is a privacy and authentication protocol designed for passive tags. The authors claim that the protocol, being resistant to commonly assumed attacks, requires little computation and pr...

2012
Chien-Lung Hsu Yu-Hao Chuang

An authentication protocol allows on-line service providers to validate the identity or legitimacy of a logging user. Once passing the verification, an authorized user can obtain useful and valuable resource or services from the service provider through Internet conveniently. However, most the current authentication protocols cannot protect user’s privacy perfectly. To improve this deficiency, ...

2017
Shadi Nashwan

Near Field Communication (NFC) is an attractive technology which is used in several countries for contactless payment operations via mobiles. This technology is suffered from increasing the security weaknesses. In the NFC mobile payment systems, the payment operations are vulnerable to various attacks. Therefore, the authentication protocol in the NFC technology has the highest priority to deve...

2008
Michele Bugliesi Riccardo Focardi Matteo Maffei

We propose a new method for the static analysis of entity authentication protocols. We develop our approach based on a dialect of the spi-calculus as the underlying formalism for expressing protocol narrations. Our analysis validates the honest protocol participants against static (hence decidable) conditions that provide formal guarantees of entity authentication. The main result is that the v...

2004
Michele Bugliesi Riccardo Focardi Matteo Maffei

ESOP 2004, LNCS 2986, pages 140–154, 2004. c © Springer–Verlag, Berlin Heildelberg 2003. We propose a new method for the static analysis of entity authentication protocols. We develop our approach based on a dialect of the spi-calculus as the underlying formalism for expressing protocol narrations. Our analysis validates the honest protocol participants against static (hence decidable) conditio...

2016
Md. Endadul Hoque

PROTECTING PRIVACY AND ENSURING SECURITY OF RFID SYSTEMS USING PRIVATE AUTHENTICATION PROTOCOLS Md. Endadul Hoque Marquette University, 2010 Radio Frequency IDentification (RFID) systems have been studied as an emerging technology for automatic identification of objects and assets in various applications ranging from inventory tracking to point of sale applications and from healthcare applicati...

2001
Min-Shiang Hwang Chin-Chen Chang Kuo-Feng Hwang Shieh-Yang-Sun’s Proto

This letter presents a secure authentication protocol which supports both the privacy of messages and the authenticity of the communicating parties. A scheme for extending a secure authentication protocol to improve the security of the communicating parties is also proposed.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید