Paulo Pagliusi | Royal Holloway, University of London (original) (raw)

Paulo  Pagliusi

Phone: +55 21 8768 8686
Address: Ipanema - Rio de Janeiro - RJ

less

Related Authors

David Seamon

Michael Ralph

Armando Marques-Guedes

Andrew N Liaropoulos

Barbara Prainsack

Roshan Chitrakar

Lev Manovich

Lev Manovich

Graduate Center of the City University of New York

Dr. Shadab Alam

Dr. Matthew Crosston

Bálint Molnár

Uploads

Papers by Paulo Pagliusi

Research paper thumbnail of Introdução de Mecanismos de Segurança em Sistemas de Correio Eletrônico

Research paper thumbnail of Internet Authentication for Remote Access

Page 1. Internet Authentication for Remote Access Paulo Sergio Pagliusi Technical Report RHUL–MA–... more Page 1. Internet Authentication for Remote Access Paulo Sergio Pagliusi Technical Report RHUL–MA–2008–15 20 March 2008 Royal Holloway University of London Department of Mathematics Royal Holloway, University of ...

Research paper thumbnail of Critografia e certificação digital

Research paper thumbnail of Heterogeneous Internet access via PANA/UMTS

the Proceedings of 3rd International …, Jan 1, 2004

Research paper thumbnail of PANA/IKEv2: an Internet authentication protocol for heterogeneous access

Information Security Applications, Jan 1, 2004

Currently there are no Internet access authentication protocols available that support both symme... more Currently there are no Internet access authentication protocols available that support both symmetric and asymmetric cryptographic techniques, can be carried over arbitrary access networks, and are flexible enough to be re-used in all the likely future ubiquitous mobility access contexts. This article proposes the PANA/IKEv2 authentication protocol for heterogeneous network access as a step towards filling this gap. A security analysis of the PANA/IKEv2 protocol is also provided. This article aims primarily at contributing to the design of authentication protocols suitable for use in future heterogeneous Internet access environments supporting ubiquitous mobility.

Research paper thumbnail of Is entity authentication necessary?

Security Protocols, Jan 1, 2004

Research paper thumbnail of PANA/GSM authentication for Internet access

… Future and Symposium on Trends in …, Jan 1, 2003

Research paper thumbnail of A contemporary foreword on GSM Security

Infrastructure Security, Jan 1, 2002

This article contains a current outline of the GSM system security, with focus on the air interfa... more This article contains a current outline of the GSM system security, with focus on the air interface protocol. It presents the terminology and describes the GSM security operation, including its principles and features. This document also discusses the effectiveness of GSM authentication and the strength of GSM encryption. It includes therefore the most significant physical and cryptanalytic attacks on GSM security mechanisms, such as the up to date optical fault induction and partitioning attacks. GSM security features retained and enhanced for the 3G Security and further applications in network (Internet) remote access are also contemplated. This article aims primarily at contributing to a progressive research in mobile systems security and at reviewing the security solutions implemented in this area for further applications.

Books by Paulo Pagliusi

Research paper thumbnail of Internet Authentication for Remote Access

Nowadays, IP mobile devices need to employ a variety of different network access technologies to ... more Nowadays, IP mobile devices need to employ a variety of different network access technologies to gain ubiquitous connectivity. This book reviews the authentication infrastructure challenges for Internet remote access supporting ubiquitous client mobility, and proposes a series of solutions obtained by adapting and reinforcing security techniques arising from different sources. The focus is on entity authentication protocols that can be carried both by the IETF PANA authentication carrier and by the EAP mechanisms, and possibly making use of an AAA infrastructure. The core idea is to adapt authentication protocols arising from the mobile telecommunications sphere to Internet remote access. A proposal is also given for Internet access using a public key based authentication protocol. The subsequent security analysis of the proposed protocols covers a variety of aspects, including: key freshness, DoS-resistance, and false-entity-in-the-middle attacks, in addition to identity privacy of users accessing the Internet via mobile devices. This book is destined to researchers or anyone else who is interested on authentication mechanisms for Internet remote access aiming ubiquitous mobility.

Research paper thumbnail of Introdução de Mecanismos de Segurança em Sistemas de Correio Eletrônico

Research paper thumbnail of Internet Authentication for Remote Access

Page 1. Internet Authentication for Remote Access Paulo Sergio Pagliusi Technical Report RHUL–MA–... more Page 1. Internet Authentication for Remote Access Paulo Sergio Pagliusi Technical Report RHUL–MA–2008–15 20 March 2008 Royal Holloway University of London Department of Mathematics Royal Holloway, University of ...

Research paper thumbnail of Critografia e certificação digital

Research paper thumbnail of Heterogeneous Internet access via PANA/UMTS

the Proceedings of 3rd International …, Jan 1, 2004

Research paper thumbnail of PANA/IKEv2: an Internet authentication protocol for heterogeneous access

Information Security Applications, Jan 1, 2004

Currently there are no Internet access authentication protocols available that support both symme... more Currently there are no Internet access authentication protocols available that support both symmetric and asymmetric cryptographic techniques, can be carried over arbitrary access networks, and are flexible enough to be re-used in all the likely future ubiquitous mobility access contexts. This article proposes the PANA/IKEv2 authentication protocol for heterogeneous network access as a step towards filling this gap. A security analysis of the PANA/IKEv2 protocol is also provided. This article aims primarily at contributing to the design of authentication protocols suitable for use in future heterogeneous Internet access environments supporting ubiquitous mobility.

Research paper thumbnail of Is entity authentication necessary?

Security Protocols, Jan 1, 2004

Research paper thumbnail of PANA/GSM authentication for Internet access

… Future and Symposium on Trends in …, Jan 1, 2003

Research paper thumbnail of A contemporary foreword on GSM Security

Infrastructure Security, Jan 1, 2002

This article contains a current outline of the GSM system security, with focus on the air interfa... more This article contains a current outline of the GSM system security, with focus on the air interface protocol. It presents the terminology and describes the GSM security operation, including its principles and features. This document also discusses the effectiveness of GSM authentication and the strength of GSM encryption. It includes therefore the most significant physical and cryptanalytic attacks on GSM security mechanisms, such as the up to date optical fault induction and partitioning attacks. GSM security features retained and enhanced for the 3G Security and further applications in network (Internet) remote access are also contemplated. This article aims primarily at contributing to a progressive research in mobile systems security and at reviewing the security solutions implemented in this area for further applications.

Research paper thumbnail of Internet Authentication for Remote Access

Nowadays, IP mobile devices need to employ a variety of different network access technologies to ... more Nowadays, IP mobile devices need to employ a variety of different network access technologies to gain ubiquitous connectivity. This book reviews the authentication infrastructure challenges for Internet remote access supporting ubiquitous client mobility, and proposes a series of solutions obtained by adapting and reinforcing security techniques arising from different sources. The focus is on entity authentication protocols that can be carried both by the IETF PANA authentication carrier and by the EAP mechanisms, and possibly making use of an AAA infrastructure. The core idea is to adapt authentication protocols arising from the mobile telecommunications sphere to Internet remote access. A proposal is also given for Internet access using a public key based authentication protocol. The subsequent security analysis of the proposed protocols covers a variety of aspects, including: key freshness, DoS-resistance, and false-entity-in-the-middle attacks, in addition to identity privacy of users accessing the Internet via mobile devices. This book is destined to researchers or anyone else who is interested on authentication mechanisms for Internet remote access aiming ubiquitous mobility.

Log In