Otway–Rees protocol

Results: 8



#Item
1Information / Reflection attack / Cryptographic nonce / Password authentication protocol / Public-key cryptography / Otway–Rees protocol / Needham–Schroeder protocol / Cryptography / Cryptographic protocols / Data

Dynamic Types for Authentication ∗ Michele Bugliesi Riccardo Focardi Matteo Maffei Dipartimento di Informatica, Università Ca’ Foscari di Venezia, Via Torino 155, IMestre (Ve), Italy

Add to Reading List

Source URL: www.dsi.unive.it

Language: English - Date: 2009-01-08 08:47:19
2Needham–Schroeder protocol / Cryptographic nonce / Challenge-response authentication / RSA / Otway–Rees protocol / Cryptography / Cryptographic protocols / Public-key cryptography

Authenticity by Tagging and Typing ∗ Michele Bugliesi Riccardo Focardi Matteo Maffei Università Ca’Foscari di Venezia

Add to Reading List

Source URL: www.dsi.unive.it

Language: English - Date: 2005-06-07 06:43:38
3Mathematics / Prime-counting function / Cryptographic nonce / Π-calculus / Data / Cyberwarfare / Otway–Rees protocol / Cryptographic protocols / Cryptography / Reflection attack

Compositional Analysis of Authentication Protocols ? Michele Bugliesi, Riccardo Focardi, and Matteo Maffei Dipartimento di Informatica, Università Ca’ Foscari di Venezia, Via Torino 155, IMestre (Ve), Italy {mi

Add to Reading List

Source URL: www.dsi.unive.it

Language: English - Date: 2005-06-07 06:44:01
4Cryptographic protocols / Computing / Burrows–Abadi–Needham logic / Cryptographic nonce / Challenge-response authentication / Communications protocol / Transmission Control Protocol / Otway–Rees protocol / Cryptography / Data / Information

Modelling Cryptographic Protocols in a Theory of Action James P. Delgrande and Torsten Grote and Aaron Hunter School of Computing Science, Simon Fraser University, Burnaby, B.C., Canada V5A 1S6.

Add to Reading List

Source URL: www.cs.sfu.ca

Language: English - Date: 2010-05-31 18:52:04
5Information / Needham–Schroeder protocol / Cryptographic nonce / Challenge-response authentication / Burrows–Abadi–Needham logic / Communications protocol / Public-key cryptography / Transmission Control Protocol / Otway–Rees protocol / Cryptographic protocols / Data / Cryptography

A General Approach to the Verification of Cryptographic Protocols using Answer Set Programming James P. Delgrande, Torsten Grote, and Aaron Hunter School of Computing Science, Simon Fraser University,

Add to Reading List

Source URL: www.cs.sfu.ca

Language: English - Date: 2010-05-31 18:50:51
6Information / Challenge-response authentication / Password authentication protocol / Public-key cryptography / Cryptographic nonce / Needham–Schroeder protocol / Otway–Rees protocol / Cryptographic protocols / Cryptography / Data

NRL Release Number[removed]Environmental Requirements for Authentication Protocols Ran Canetti1 and Catherine Meadows2 and Paul Syverson2 1

Add to Reading List

Source URL: www.nrl.navy.mil

Language: English - Date: 2013-04-29 10:13:46
7Otway–Rees protocol / Sense / Biology / Needham–Schroeder protocol / Homomorphism

Searching for Shapes in Cryptographic Protocols (extended version)? Shaddin F. Doghmi, Joshua D. Guttman, and F. Javier Thayer The MITRE Corporation Abstract. We describe a method for enumerating all essentially differe

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-02-02 08:32:07
8Information / Needham–Schroeder protocol / Cryptographic nonce / Promela / Public-key cryptography / Communications protocol / Transmission Control Protocol / Otway–Rees protocol / HTTPsec / Cryptographic protocols / Data / Cryptography

Using SPIN to Verify Security Properties of Cryptographic Protocols Paolo Maggi and Riccardo Sisto Dip. di Automatica e Informatica - Politecnico di Torino Corso Duca degli Abruzzi 24, I[removed]Torino, ITALY maggi@athena.

Add to Reading List

Source URL: spinroot.com

Language: English - Date: 2008-06-30 15:34:28
UPDATE