Results 1 - 10
of
1,923
Authentication tests
- In Proceedings, 2000 IEEE Symposium on Security and Privacy. May, IEEE Computer
, 2000
"... Abstract. The shapes of a cryptographic protocol are its minimal, essentially different executions. In previous work, we have described a search algorithm to discover the shapes of a protocol, and implemented the algorithm in a Cryptographic Protocol Shape Analyzer cpsa. In this paper, we show its c ..."
Abstract
-
Cited by 40 (12 self)
- Add to MetaCart
completeness, i.e. that every shape can in fact be found in a finite number of steps. The steps in question are applications of two authentication tests, fundamental protocol patterns for analysis and heuristics for protocol design. We formulate the authentication tests in a new, stronger form, for which
Authentication Tests and the Structure of Bundles
- Theoretical Computer Science
, 2002
"... Suppose a principal in a cryptographic protocol creates and transmits a message containing a new value v, later receiving v back in a different cryptographic context. It can conclude that some principal possessing the relevant key has received and transformed the message in which v was emitted. In s ..."
Abstract
-
Cited by 54 (19 self)
- Add to MetaCart
. In some circumstances, this principal must be a regular participant of the protocol, not the penetrator. An inference of this kind is an authentication test. We introduce two main kinds of authentication test. An outgoing test is one in which the new value v is transmitted in encrypted form, and only a
Face Authentication Test on . . .
"... This paper details the results of a Face Authentication Test (FAT2004) [5] held in conjunction with the 17th International Conference on Pattern Recognition. The contest was held on the publicly available BANCA database [1] according to a defined protocol [7]. The competition also had a sequestered ..."
Abstract
- Add to MetaCart
This paper details the results of a Face Authentication Test (FAT2004) [5] held in conjunction with the 17th International Conference on Pattern Recognition. The contest was held on the publicly available BANCA database [1] according to a defined protocol [7]. The competition also had a
Abstract Authentication Tests and the Structure of Bundles ⋆
"... Suppose a principal in a cryptographic protocol creates and transmits a message containing a new value v, later receiving v back in a different cryptographic context. It can conclude that some principal possessing the relevant key has received and transformed the message in which v was emitted. In s ..."
Abstract
- Add to MetaCart
. In some circumstances, this principal must be a regular participant of the protocol, not the penetrator. An inference of this kind is an authentication test. We introduce two main kinds of authentication test. An outgoing test is one in which the new value v is transmitted in encrypted form, and only a
USIM based Authentication Test-bed
"... Abstracts – In view of mutual complementary feature of wide coverage and high data rate, the interworking between 3G cellular network and WLAN is a global trend of wireless communications. In this paper, we analyze an authentication mechanism for 3GPP-WLAN seamless mobility by USIMbased authenticati ..."
Abstract
- Add to MetaCart
authentication test-bed. In handover between heterogeneous networks, authentication is the main factor of handover delay. So authentication processing time should be firstly reduced. This paper describes an USIMbased EAP-AKA Test-bed implemented for handover in UMTS and WLAN interworking systems. For considering
Security Protocol Design via Authentication Tests
- In Proceedings of 15th IEEE Computer Security Foundations Workshop. IEEE Computer
, 2002
"... We describe a protocol design process, and illustrate its use by creating ATSPECT, an Authentication Test-based Secure Protocol for Electronic Commerce Transactions. The design process is organized around the authentication tests, a method for protocol verification based on the strand space theory. ..."
Abstract
-
Cited by 22 (1 self)
- Add to MetaCart
We describe a protocol design process, and illustrate its use by creating ATSPECT, an Authentication Test-based Secure Protocol for Electronic Commerce Transactions. The design process is organized around the authentication tests, a method for protocol verification based on the strand space theory
Key Compromise, Strand Spaces, and the Authentication Tests
- In Mathematical Foundations of Programming Semantics
, 2001
"... Some cryptographic protocols are vulnerable to replay attacks, a type of weakness that was a focus of attention in the Burroughs-Abadi-Needham logic. Newer, more operational approaches to protocol analysis have not concentrated on this type of attack. This paper fills the gap for the strand space th ..."
Abstract
-
Cited by 10 (0 self)
- Add to MetaCart
theory. The main technical point is to provide a definition of recency. Our candidate is convenient because we already have a powerful way to prove events recent, namely the incoming and outgoing authentication tests. A secondary purpose of this paper is to illustrate an easily mechanized pattern
Formal Protocol Design of ESIKE Based on Authentication Tests
"... In this paper, we first present a concrete formal protocol design approach, which is based on authentication tests, to create an Efficient and Secure Internet Key Exchange (ESIKE) protocol. Then we formally prove the secure properties of ESIKE with strand space model and authentication tests. The ES ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
In this paper, we first present a concrete formal protocol design approach, which is based on authentication tests, to create an Efficient and Secure Internet Key Exchange (ESIKE) protocol. Then we formally prove the secure properties of ESIKE with strand space model and authentication tests
Cryptographic protocol composition via the authentication tests
, 2009
"... Abstract. Although cryptographic protocols are typically analyzed in isolation, they are used in combinations. If a protocol was analyzed alone and shown to meet some security goals, will it still meet those goals when executed together with a second protocol? While not every choice of a second prot ..."
Abstract
-
Cited by 13 (7 self)
- Add to MetaCart
its security goals. Strand spaces provide the models for L(Π). Second, the strand space “authentication test ” principles suggest our syntactic criterion for security goals to be preserved. Third, certain homomorphisms among models for L(Π) preserve the truth of formulas of the syntactic form
The Leichhardt nameplate – a report on authenticity testing
"... The use of science in the examination of historical objects is a process that aids in making an object talk and live. It also has a more serious side – it is often used to assess the likelihood of an object being misrepresented. Examination of historic objects is exciting as you unravel questions an ..."
Abstract
- Add to MetaCart
The use of science in the examination of historical objects is a process that aids in making an object talk and live. It also has a more serious side – it is often used to assess the likelihood of an object being misrepresented. Examination of historic objects is exciting as you unravel questions and find more questions that beg to be answered. The examination of the LUDWIG
Results 1 - 10
of
1,923