• HMQV

  • Referenced in 77 articles [sw02714]
  • protocol of Law, Menezes, Qu, Solinas and Vanstone is possibly ... most efficient of all known authenticated Diffie-Hellman protocols that use public-key authentication...
  • NAXOS

  • Referenced in 67 articles [sw03050]
  • authenticated key agreement strengthening the well-known Canetti-Krawczyk definition. They also described a protocol ... readily modified to obtain a one-pass protocol. On the other hand MQV does ... This paper proposes a new authenticated key agreement protocol, called CMQV (‘Combined’ MQV), which incorporates...
  • CMQV+

  • Referenced in 35 articles [sw06418]
  • CMQV+: an authenticated key exchange protocol from CMQV Ustaoglu presents a secure and efficient...
  • HB-MP

  • Referenced in 8 articles [sw02600]
  • family of lightweight authentication protocols. A family of lightweight authentication protocols has been developed since ... protocol is especially suitable for RFID systems in which every tag has to be authenticated ... present in this paper a new protocol, named HB-MP, derived from HB + , providing...
  • TulaFale

  • Referenced in 14 articles [sw00986]
  • machine-checkable descriptions of SOAP-based security protocols and their properties. Our TulaFale language ... correspondence assertions (to specify authentication goals of protocols). Our implementation compiles TulaFale into the applied ... Hence, we can automatically verify authentication properties of SOAP protocols...
  • NRL

  • Referenced in 34 articles [sw12158]
  • analysis of cryptographic protocols that are used to authenticate principals and services and distribute keys...
  • SPINS

  • Referenced in 50 articles [sw02657]
  • attention. We present a suite of security protocols optimized for sensor networks: SPINS. SPINS ... SNEP includes: data confidentiality, two-party data authentication, and evidence of data freshness. µTESLA ... provides authenticated broadcast for severely resource-constrained environments. We implemented the above protocols, and show...
  • ASPIER

  • Referenced in 6 articles [sw09852]
  • model to automatically analyze authentication and secrecy properties of protocol implementations in C. The technical ... software model checking with a domain-specific protocol and symbolic attacker model. We have implemented ... verify authentication and secrecy properties of a part of an industrial strength protocol implementation...
  • GNUC

  • Referenced in 8 articles [sw12669]
  • explicit formulations for several important protocol tasks, including authenticated and secure communication, as well...
  • ProVerif

  • Referenced in 38 articles [sw06558]
  • that is, an execution trace of the protocol that falsifies the desired property (CSFW ... adversary cannot obtain the secret, CSFW’01), authentication (SAS’02) and more generally correspondence properties...
  • BIOMET

  • Referenced in 10 articles [sw02474]
  • database for person authentication is described. Details about the acquisition protocols of each modality...
  • UBAPV2G

  • Referenced in 1 article [sw20865]
  • UBAPV2G: a unique batch authentication protocol for vehicle-to-grid communications. “Vehicle-to-grid ... communications have the crucial requirements of fast authentication and encryption/decryption ... This paper proposes a unique batch authentication protocol UBAPV2G that takes into account the characteristics ... achieve less authentication delay for large number of packets. Thus, UBAPV2G protocol is suitable...
  • FORSAKES

  • Referenced in 2 articles [sw21066]
  • FORSAKES: a forward-secure authenticated key exchange protocol based on symmetric key-evolving schemes. This ... definition for forward-secure authenticated key exchange (AKE) protocols, which can be satisfied without depending...
  • G-Hadoop

  • Referenced in 12 articles [sw08480]
  • However, G-Hadoop simply reuses the user authentication and job submission mechanism of Hadoop, which ... protocol, and is dedicatedly designed for distributed environments. This security framework simplifies the users authentication...
  • CAKE

  • Referenced in 2 articles [sw23884]
  • cryptosystems. Then, we present an authenticated key exchange protocol based on CAKE, which is suitable...
  • MCMAS-X

  • Referenced in 3 articles [sw02864]
  • verify authentication properties in the TESLA secure stream protocol. MCMAS-X is an extension...
  • CASPA_

  • Referenced in 2 articles [sw04078]
  • CASPA tool: Causality-based abstraction for security protocol analysis. Tool paper CASPA constitutes a push ... automatically proving secrecy and authenticity properties of cryptographic protocols. The tool is grounded...
  • sHMQV

  • Referenced in 1 article [sw27450]
  • paper we focus on designing authenticated key exchange protocols for practical scenarios where the party...
  • EC2C-PAKA

  • Referenced in 11 articles [sw03308]
  • paper, we study client-to-client password-authenticated key agreement (C2C-PAKA) enabling two clients ... first presented a C2C-PAKA protocol under the cross-realm setting. However, the scheme...
  • S-RIP

  • Referenced in 3 articles [sw02570]
  • vector routing protocols are insecure due to: 1) the lack of strong authentication and authorization ... this paper, we introduce a secure routing protocol, namely S-RIP, based on a distance...