Verification of three authentication protocols using BAN, SVO and Strand Spaces (original) (raw)

Modeling and verification of Extensible Authentication Protocol for Transport layer Security in Wireless LAN environment

Sanjay Singh

2010 2nd International Conference on Software Technology and Engineering, 2010

View PDFchevron_right

Stronger authentication for password credential Internet Services

Todd Booth

2017 Third International Conference on Mobile and Secure Services (MobiSecServ), 2017

View PDFchevron_right

User authentication schemes for mobile and handheld devices

Naveen kumar

View PDFchevron_right

Implementing New-age Authentication Techniques using OpenID for Security Automation

Rekha Shahapurkar

Arxiv preprint arXiv: …, 2010

View PDFchevron_right

Enhanced Framework for Authentication as a Service to Ensure Security in Public Cloud Environment

S. Monikandan

International Journal of Engineering Research and, 2015

View PDFchevron_right

HANDBOOK of APPLIED CRYPTOGRAPHY

Guilherme Morais

View PDFchevron_right

Two-phase authentication protocol for wireless sensor networks in distributed IoT applications

Pawani Porambage

2014 IEEE Wireless Communications and Networking Conference (WCNC), 2014

View PDFchevron_right

Biometric authentication in relation to payment systems and ATMs

Gerik von Graevenitz

Datenschutz und Datensicherheit - DuD, 2007

View PDFchevron_right

An Industrial and Academic Joint Experiment on Automated Verification of a Security Protocol

Thomas Genet

Mobile and Wireless Networks Security - Proceedings of the MWNS 2008 Workshop, 2008

View PDFchevron_right

Authentication Schemes for Open Distributed Network: A Classification

Deepak Kumar

International Journal of Computer Applications, 2013

View PDFchevron_right

Authentication Protocol For Cross Realm SOA-Based Business Processes

Layth Kamil

2012

View PDFchevron_right

Verifying Cryptographic Protocols with Subterms Constraints

Yannick Chevalier

Lecture Notes in Computer Science

View PDFchevron_right

Security Issues in Internet Architecture and Protocols Based on Behavioural Biometric Block Chain-Enhanced Authentication Layer

FERNANDO ANTONIO FLORES LIMO

Journal of Internet Services and Information Security, 2023

View PDFchevron_right

Evaluation of Authentication Algorithms for Small Devices

Georg Carle

2004

View PDFchevron_right

Method of Authentication Table of Contents

ziv barzilay

2008

View PDFchevron_right

Extension of Kerberos with X.509 and Integration of Elliptic Curve Cryptography in Authentication

murat akkaya

International Journal of Communications, Network and System Sciences, 2016

View PDFchevron_right

A survey of authentication protocol literature: Version 1.0

John Clark

1997

View PDFchevron_right

Experimental Validation of New SIP Authentication Protocol

Azidine Guezzaz

Big Data and Networks Technologies, 2019

View PDFchevron_right

Credentials and beliefs in remote trusted platforms attestation

GIANLUCA DINI

Proceedings - WoWMoM 2006: 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks, 2006

View PDFchevron_right

Identity authentication in heterogeneous computing environments: a comparative study for an integrated framework

Shivraj Kanungo

Computers & Security, 1994

View PDFchevron_right

Cryptanalysis and improvement of a biometric-based remote user authentication protocol usable in a multiserver environment

hari om

Transactions on Emerging Telecommunications Technologies, 2017

View PDFchevron_right

Multi-factor authentication for users of non-internet based applications of blockchain-based platforms

Komminist Weldemariam

2020 IEEE International Conference on Blockchain (Blockchain), 2020

View PDFchevron_right

The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications

Yannick Chevalier

Computer Aided Verification, 2005

View PDFchevron_right

Two Factor Authentication Made Easy

Alex Q. Chen

Lecture Notes in Computer Science, 2015

View PDFchevron_right

Adaptive Authentication using User’s Uniqueness Quotient

Harippriya Sivapatham

2019

View PDFchevron_right