Authentication protocols

Results: 771



#Item
71Computing / Network architecture / Internet / Internet protocols / Computer network security / Internet Standards / Transmission Control Protocol / Tunneling protocols / Port knocking / SOCKS / Internet protocol suite / Port scanner

S ILENT K NOCK: Practical, Provably Undetectable Authentication Eugene Y. Vasserman1 , Nicholas Hopper1, John Laxson2 , and James Tyra1 1 Computer Science and Engineering, University of Minnesota, Minneapolis, MN 55455

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2007-07-26 16:56:51
72Cryptography / Protocol composition logic / Authentication protocols / BurrowsAbadiNeedham logic / Communications protocol / Kerberos / Public-key cryptography / Cryptographic protocol

A. Datta et al. / Protocol Composition Logic 1 Protocol Composition Logic Anupam DATTA a , John C. MITCHELL b , Arnab ROY b and

Add to Reading List

Source URL: seclab.stanford.edu

Language: English - Date: 2010-07-17 01:14:08
73Cryptography / Authentication protocols / Computer network security / Ciphertext indistinguishability / DolevYao model / Advantage / Kerberos / Cryptographic protocol / Security parameter / XTR / Challengeresponse authentication / Security protocol notation

Inductive Proof Method for Computational Secrecy Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell Department of Computer Science, Stanford University Abstract. We investigate inductive methods for proving secrecy p

Add to Reading List

Source URL: seclab.stanford.edu

Language: English - Date: 2010-07-17 01:14:15
74Cryptography / Computing / Secure communication / Transport Layer Security / Cryptographic protocols / Computer access control / Public key infrastructure / Public-key cryptography / Internet Relay Chat / Key management / Cryptographic hash function / Challengeresponse authentication

SafeSlinger: Easy-to-Use and Secure Public-Key Exchange Michael Farb Yue-Hsun Lin Tiffany Hyun-Jin Kim

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English - Date: 2015-06-01 09:06:14
75Authentication protocols / Symmetric-key cryptography / Computer network security / IP / Kerberos / NeedhamSchroeder protocol / Cryptography

Secrecy Analysis in Protocol Composition Logic? Arnab Roy1 , Anupam Datta1 , Ante Derek1 , John C. Mitchell1 , Jean-Pierre Seifert2 1 2

Add to Reading List

Source URL: seclab.stanford.edu

Language: English - Date: 2010-07-17 01:14:15
76

Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks Peng Wang1 , Yongdae Kim1 , Vishal Kher1 , and Taekyoung Kwon2 1 2

Add to Reading List

Source URL: syssec.kaist.ac.kr

Language: English - Date: 2012-09-03 21:42:57
    77Cryptographic protocols / Public-key cryptography / Notary / Online chat / Internet protocols / Deniable authentication / XMPP / Off-the-Record Messaging / Authentication / Digital signature / Key exchange / Transport Layer Security

    Improved Group Off-the-Record Messaging Hong Liu Eugene Y. Vasserman Nicholas Hopper

    Add to Reading List

    Source URL: www-users.cs.umn.edu

    Language: English - Date: 2013-09-04 15:59:08
    78Cryptography / Public-key cryptography / Authentication protocols / Symmetric-key cryptography / NeedhamSchroeder protocol / Cryptographic nonce / XTR / Digital signature / Subtyping / Security protocol notation

    Types and Effects for Asymmetric Cryptographic Protocols Andrew D. Gordon Microsoft Research Cambridge, UK Alan Jeffrey

    Add to Reading List

    Source URL: ect.bell-labs.com

    Language: English - Date: 2010-12-15 21:36:15
    79Authentication protocols / Symmetric-key cryptography / NeedhamSchroeder protocol / Cryptographic protocol

    PDF Document

    Add to Reading List

    Source URL: ect.bell-labs.com

    Language: English - Date: 2010-12-15 21:38:38
    UPDATE