Results 161 to 170 of about 3,562 (188)
Safe to Speak, Teach, and Research? Experiences of Reprisals in Danish Academia
The British Journal of Sociology, EarlyView.
Liv Bjerre +6 more
wiley +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Security Analysis Based on BAN Logic
2020Many quantum authentication schemes have been designed according to quantum key distribution. Scheme security is proved heuristically by employing attack strategies such as intercept-measure-resend attack, entanglement-measure attack, etc. In this chapter, we introduce security analysis based on BAN logic. In contrast to analyzing protocols with common
Tao Shang, Jianwei Liu
openaire +1 more source
Security Analysis of OIAP Implementation Based on BAN Logic
2009 International Conference on Multimedia Information Networking and Security, 2009In the specification of Trusted Platform Module (TPM), Object-Independent Authorization Protocol (OIAP) is the protocol which guarantees the security of the communication between TPM and its users. Nowadays, there are many TPM manufacturers having made their own TPM. However, some of the TPM manufacturers don't implement the TPM completely according to
Xu Shiwei +4 more
openaire +1 more source
Improved Kerberos Security Protocol Evaluation using Modified BAN Logic
2010 10th IEEE International Conference on Computer and Information Technology, 2010Online communication offers organizations greater efficiency. However, online processes increase the threat level during message transfer. This necessitates researchers to develop and improve security protocols in order to enhance the security of communication lines.
N.T. Abdelmajid +3 more
openaire +1 more source
On BAN Logics for Industrial Security Protocols
2002This paper reports on two case-studies of applying BAN logic to industrial strength security protocols. These studies demonstrate the flexibility of the BAN language, as it caters for the addition of appropriate constructs and rules. We argue that, although a semantical foundation of the formalism is lacking, BAN logic provides an intuitive and ...
Agray, N., van der Hoek, W., Vink, E.
openaire +3 more sources
Security Analysis of the Kerberos Protocol Using BAN Logic
2009 Fifth International Conference on Information Assurance and Security, 2009Kerberos protocol is a famous identity authentication protocol and it is widely used in the network as a standard. But there is still not a strict proof of it base on the Formal method. That is very nervous for the users. So a security analysis of the Kerberos protocol using BAN logic is proposed in this paper, and the reliability, practicability and ...
Kai Fan, Hui Li, Yue Wang
openaire +1 more source
An Improved Security Protocol Formal Analysis with BAN Logic
2009 International Conference on Electronic Commerce and Business Intelligence, 2009BAN logic can prove whether a protocol can reach expected target and find some flaws in the protocol. The paper analyzed constitute of BAN logic and analysis steps. On the basis of the above work, BAN logic was used to construct an ideal model of the improved NSSK protocol and the security of the NSSK protocol was analyzed with the initial hypothesis ...
Li Tingyuan +3 more
openaire +1 more source
Extending BAN Logic for Reasoning with Modern PKI-Based Protocols
2008 IFIP International Conference on Network and Parallel Computing, 2008BAN logic is a well-known authentication logic which, despite other more recent logics and formal methods, remains popular with many protocol designers. BAN Logic however does not properly deal with the issues of certificates and the use of public key infrastructure (PKI).
null Sufatrio, Roland H. C. Yap
openaire +1 more source
Validating the Use of BAN LOGIC
2004Most attacks against security protocols are due to their vulnerable designs. These type of protocols are usually the base which many other protocols and applications are built upon, so proving the correctness of such protocols has become a very important issue in recent years.
José M. Sierra +3 more
openaire +1 more source
The Security Analysis on Otway-Rees Protocol Based on BAN Logic
2012 Fourth International Conference on Computational and Information Sciences, 2012This paper analyzes the Otway-Rees protocol based on BAN logic after has introducing the BAN logic. It has verified that the BAN logic can be used formally and prove the correctness and security of the protocols, which indicates that BAN logic is an important tool for analyzing cryptographic protocols. The paper has established the ideal protocol model
Kening Liu, Junyao Ye, Yinglian Wang
openaire +1 more source

