سیویلیکا را در شبکه های اجتماعی دنبال نمایید.

Authentication in Parallel Multiple-Sessions Execution of Protocols

Publish Year: 1386
Type: Conference paper
Language: English
View: 2,369

This Paper With 6 Page And PDF Format Ready To Download

Export:

Link to this Paper:

Document National Code:

ISCC04_047

Index date: 1 March 2007

Authentication in Parallel Multiple-Sessions Execution of Protocols abstract

Many security protocols have the aim of authenticating one agent acting as initiator to another agent acting as responder and vice versa. Sometimes, authentication fails because of executing several parallel sessions of a protocol, and that an agent may play both the initiator and responder role in parallel sessions. We take advantage of the notion of transition systems to specify authentication for parallel multiple sessions execution.

Authentication in Parallel Multiple-Sessions Execution of Protocols Keywords:

Authentication in Parallel Multiple-Sessions Execution of Protocols authors

Rasool Ramezanian

Department of Mathematical Science Sharif University of Technology Department of Mathematical Science Sharif University of Technology

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
Abadi, M., and Tuttle, M. A semantic for a logic ...
Symposium _ Principals of Distributed Computing. 1991, pp. 201-216. (extended ...
Baeten, J., Basten, T., and Reniers, M. Process Algebra, Equational ...
of C ommun ication Processes. 2006. DRAFT Jun 26, 2006. ...
Burrows, M., Abadi, M., and Needham. A logic for auth ...
of the Royal Society of London A, no. 426:233-271. 1989. ...
Fabrega, F. T., Herzog, J., and Guttman, _ Strand spaces: ...
protocol correct? In Proceedings IEEE Symposium _ Security and Privacy. ...
Fabrega, F. T., Herzog, J., and Guttman, _ Strand spaces: ...
protocols correct. In Journal of Computer Security, 7. 1999, pp. ...
Lowe, G. Breaking and fixing needham schroeder public-key protocol using ...
Proceedings TACAS. 1996, pp. 147-166. ...
Lowe, G. A family of attacks upon security protocols. In ...
Department of Mathematics and Computer Science, Univ. of Leicester, 1997. ...
Lowe, G. A hierarchy of auth entication specifications. In Proceedings ...
Computer Security Foundations Workshop. 1997. ...
نمایش کامل مراجع