Verification of three authentication protocols using BAN, SVO and Strand Spaces (original) (raw)
Related papers
2010 2nd International Conference on Software Technology and Engineering, 2010
Stronger authentication for password credential Internet Services
2017 Third International Conference on Mobile and Secure Services (MobiSecServ), 2017
User authentication schemes for mobile and handheld devices
Implementing New-age Authentication Techniques using OpenID for Security Automation
Arxiv preprint arXiv: …, 2010
Enhanced Framework for Authentication as a Service to Ensure Security in Public Cloud Environment
International Journal of Engineering Research and, 2015
HANDBOOK of APPLIED CRYPTOGRAPHY
Two-phase authentication protocol for wireless sensor networks in distributed IoT applications
2014 IEEE Wireless Communications and Networking Conference (WCNC), 2014
Biometric authentication in relation to payment systems and ATMs
Datenschutz und Datensicherheit - DuD, 2007
An Industrial and Academic Joint Experiment on Automated Verification of a Security Protocol
Mobile and Wireless Networks Security - Proceedings of the MWNS 2008 Workshop, 2008
Authentication Schemes for Open Distributed Network: A Classification
International Journal of Computer Applications, 2013
Authentication Protocol For Cross Realm SOA-Based Business Processes
2012
Verifying Cryptographic Protocols with Subterms Constraints
Lecture Notes in Computer Science
Journal of Internet Services and Information Security, 2023
Evaluation of Authentication Algorithms for Small Devices
2004
Method of Authentication Table of Contents
2008
Extension of Kerberos with X.509 and Integration of Elliptic Curve Cryptography in Authentication
International Journal of Communications, Network and System Sciences, 2016
A survey of authentication protocol literature: Version 1.0
1997
Experimental Validation of New SIP Authentication Protocol
Big Data and Networks Technologies, 2019
Credentials and beliefs in remote trusted platforms attestation
Proceedings - WoWMoM 2006: 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks, 2006
Computers & Security, 1994
Transactions on Emerging Telecommunications Technologies, 2017
2020 IEEE International Conference on Blockchain (Blockchain), 2020
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications
Computer Aided Verification, 2005
Two Factor Authentication Made Easy
Lecture Notes in Computer Science, 2015
Adaptive Authentication using User’s Uniqueness Quotient
2019