نتایج جستجو برای: ban logic

تعداد نتایج: 157888  

2014
Minghui Wang Junhua Pan

Tag cost and privacy of RFID technology are two main factors that determine whether it will be applied to Internet of Things on a large scale. Recently, RFID industry and research community have focused on RFID authentication protocols with provable privacy and low tag cost. In this paper, we propose an RFID security protocol that achieves all security requirements based on a hash function and ...

1997
Darrell Kindred Jeannette M. Wing

Cryptographic protocol design demands careful verification during all phases of development. Belief logics, in the tradition of the Burrows, Abadi, and Needham (BAN) logic of authentication [BAN90], provide a simple, intuitive model, and allow natural expressions of a protocol and its goals. Since manual deduction is error-prone, protocol designers need automated tools to make effective use of ...

Journal: :J. Inf. Sci. Eng. 1999
Shiuh-Pyng Shieh Fu-Shen Ho Yu-Lun Huang

Many existing authentication protocols supporting inter-domain authentication on the Internet require their clients to communicate with every involved key distribution center (KDC) directly. This is inefficient and costly when the client side is a wireless mobile unit, for wireless transmission has relatively lower bandwidth, and a mobile unit is battery powered. In this paper, we present a mob...

Journal: :J. Internet Serv. Inf. Secur. 2011
William R. Claycomb Dongwan Shin

Authentication between mobile devices in ad-hoc computing environments is a challenging problem. Without pre-shared knowledge, existing applications must rely on additional communication methods, such as out-of-band or location-limited channels for device authentication. Much of the focus in development of new applications in this area seeks to reduce or eliminate the impact of this additional ...

2009
Jeonghoon Han Hanjae Jeong Dongho Won Seungjoo Kim

As the Internet technology has developed rapidly, the number of identities (IDs) managed by each individual person has increased and various ID management technologies have been developed to assist users. However, most of these technologies are vulnerable to the existing hacking methods such as phishing attacks and key-logging. If the administrator’s password is exposed, an attacker can access ...

Journal: :Electr. Notes Theor. Comput. Sci. 1999
Paul Syvreson

The logic BAN was developed in the late eighties to reason about authenticated key establishment protocols. It uncovered many aws and properties of protocols, thus generating lots of attention in protocol analysis. BAN itself was also subject of much attention, and work was done examining its properties and limitations, developing extensions and alternatives, and giving it a semantics. More rec...

Journal: :JDCTA 2010
Ang Gao

In wireless ad hoc networks environment, Bellovin and Merritt first developed a password-based Encrypted Key Exchange (EKE) protocol against offline dictionary attacks using both symmetric and public-key cryptography independent of the public key infrastructure (PKI). In this paper, we first discover that there exist some weaknesses in EKE protocol that is subjected to imposter attacks based on...

Journal: :Notre Dame Journal of Formal Logic 1982
Giangiacomo Gerla

Let A be a well-formed formula of first-order modal logic whose only free variable is x. We shall use the following abbreviations: Mat(A) for (x)[OA * 0~A] Form(A) for (x)[DA vD-i] Ban(A) for ((x)DA) v ((x)U~A) Pred(A) for Form(A) v Mat(A). We read Mat(A), FormjA), and Ban(A) respectively as: "A is material", "A is formal", and "A is banal"; Pred(A) is the assertion of the Principle of Predica-...

1999
Paul Syverson

The logic BAN was developed in the late eighties to reason about authenticated key establishment protocols. It uncovered many aws and properties of protocols, thus generating lots of attention in protocol analysis. BAN itself was also subject of much attention, and work was done examining its properties and limitations, developing extensions and alternatives, and giving it a semantics. More rec...

1999
David Monniaux

Belief-logic deductions are used in the analysis of cryptographic protocols. We show a new method to decide such logics. In addition to the familiar BAN logic, it is also applicable to the more advanced versions of protocol security logics, and GNY in particular; and it employs an efficient forward-chaining algorithm the completeness and termination of which are proved. Theoretic proofs, implem...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید