Needham–Schroeder protocol

Results: 30



#Item
21Otway–Rees protocol / Sense / Biology / Needham–Schroeder protocol / Homomorphism

Searching for Shapes in Cryptographic Protocols (extended version)? Shaddin F. Doghmi, Joshua D. Guttman, and F. Javier Thayer The MITRE Corporation Abstract. We describe a method for enumerating all essentially differe

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-02-02 08:32:07
22Radio-frequency identification / Wireless / Needham–Schroeder protocol / IP / Public-key cryptography / Cryptographic hash function / Cryptography / Cryptographic protocols / Automatic identification and data capture

A Light-weight Security Protocol for RFID System.

Add to Reading List

Source URL: dl.ifip.org

Language: English - Date: 2014-08-10 19:38:24
23Cyberwarfare / Kerberos / Computing / Cryptographic protocols / Key distribution center / Ticket Granting Ticket / Ticket / Needham–Schroeder protocol / Computer network security / Key management / Computer security

Kerberos for Internet-of-Things IETF89 Thomas Hardjono MIT Kerberos & Internet Trust Consortium February, 2014

Add to Reading List

Source URL: www.tschofenig.priv.at

Language: English - Date: 2014-03-04 10:40:45
24Needham–Schroeder protocol / Communications protocol / Transmission Control Protocol / Cryptographic protocols / Data / Information

Logical Methods in Computer Science Vol. 10(2:[removed], pp. 1–50 www.lmcs-online.org Submitted Published

Add to Reading List

Source URL: www.lsv.ens-cachan.fr

Language: English - Date: 2014-06-23 05:57:16
25Computing / Needham–Schroeder protocol / Near field communication / Communications protocol / Password authentication protocol / Cryptographic protocols / Data / Information

Formally defining NFC M-coupon requirements, with a case study Ali Alshehri, Steve Schneider Dept. of Computing, University of Surrey Guildford GU2 7XH, England Email: [removed] and [removed].

Add to Reading List

Source URL: www.computing.surrey.ac.uk

Language: English - Date: 2013-12-06 10:43:01
26Cryptographic protocols / Computing / Information / Near field communication / Internet protocols / Mobile payment / Needham–Schroeder protocol / Coupon / Cryptographic nonce / Technology / Mobile telecommunications / Wireless

Formal Security Analysis of NFC M-coupon Protocols using Casper/FDR Ali Alshehri, Johann A. Briffa, Steve Schneider and Stephan Wesemeyer Dept. of Computing, University of Surrey Guildford GU2 7XH, England Email: A.A.Als

Add to Reading List

Source URL: www.computing.surrey.ac.uk

Language: English - Date: 2012-12-22 16:41:06
27Information / Needham–Schroeder protocol / Cryptographic nonce / Promela / Public-key cryptography / Communications protocol / Transmission Control Protocol / Otway–Rees protocol / HTTPsec / Cryptographic protocols / Data / Cryptography

Using SPIN to Verify Security Properties of Cryptographic Protocols Paolo Maggi and Riccardo Sisto Dip. di Automatica e Informatica - Politecnico di Torino Corso Duca degli Abruzzi 24, I[removed]Torino, ITALY maggi@athena.

Add to Reading List

Source URL: spinroot.com

Language: English - Date: 2008-06-30 15:34:28
28Information / Needham–Schroeder protocol / Neuman–Stubblebine protocol / Yahalom / Wide Mouth Frog protocol / Replay attack / Public-key cryptography / Kerberos / Cryptographic nonce / Cryptographic protocols / Cryptography / Data

Pranav Vyas, Dr. Bhushan Trivedi / International Journal of Engineering Research and Applications (IJERA) ISSN: [removed]www.ijera.com

Add to Reading List

Source URL: www.ijera.com

Language: English - Date: 2012-11-17 00:05:41
29First-order logic / Needham–Schroeder protocol / Kerberos / Cyberwarfare / Mathematics / Burrows–Abadi–Needham logic / Cryptography / Logic

A Logic of Authentication M. Burrows, M. Abadi, R. Needham Robert Harper

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2007-09-13 10:55:29
30Alice and Bob / Ciphertext / RSA / Kerberos / XTR / Needham–Schroeder protocol / Security protocol notation / Cryptography / Cryptographic protocols / Public-key cryptography

Programming Satan’s Computer Ross Anderson and Roger Needham Cambridge University Computer Laboratory

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-07-26 10:17:27
UPDATE