Results 161 to 170 of about 3,562 (188)

Safe to Speak, Teach, and Research? Experiences of Reprisals in Danish Academia

open access: yes
The British Journal of Sociology, EarlyView.
Liv Bjerre   +6 more
wiley   +1 more source
Some of the next articles are maybe not open access.

Related searches:

Security Analysis Based on BAN Logic

2020
Many quantum authentication schemes have been designed according to quantum key distribution. Scheme security is proved heuristically by employing attack strategies such as intercept-measure-resend attack, entanglement-measure attack, etc. In this chapter, we introduce security analysis based on BAN logic. In contrast to analyzing protocols with common
Tao Shang, Jianwei Liu
openaire   +1 more source

Security Analysis of OIAP Implementation Based on BAN Logic

2009 International Conference on Multimedia Information Networking and Security, 2009
In the specification of Trusted Platform Module (TPM), Object-Independent Authorization Protocol (OIAP) is the protocol which guarantees the security of the communication between TPM and its users. Nowadays, there are many TPM manufacturers having made their own TPM. However, some of the TPM manufacturers don't implement the TPM completely according to
Xu Shiwei   +4 more
openaire   +1 more source

Improved Kerberos Security Protocol Evaluation using Modified BAN Logic

2010 10th IEEE International Conference on Computer and Information Technology, 2010
Online communication offers organizations greater efficiency. However, online processes increase the threat level during message transfer. This necessitates researchers to develop and improve security protocols in order to enhance the security of communication lines.
N.T. Abdelmajid   +3 more
openaire   +1 more source

On BAN Logics for Industrial Security Protocols

2002
This paper reports on two case-studies of applying BAN logic to industrial strength security protocols. These studies demonstrate the flexibility of the BAN language, as it caters for the addition of appropriate constructs and rules. We argue that, although a semantical foundation of the formalism is lacking, BAN logic provides an intuitive and ...
Agray, N., van der Hoek, W., Vink, E.
openaire   +3 more sources

Security Analysis of the Kerberos Protocol Using BAN Logic

2009 Fifth International Conference on Information Assurance and Security, 2009
Kerberos protocol is a famous identity authentication protocol and it is widely used in the network as a standard. But there is still not a strict proof of it base on the Formal method. That is very nervous for the users. So a security analysis of the Kerberos protocol using BAN logic is proposed in this paper, and the reliability, practicability and ...
Kai Fan, Hui Li, Yue Wang
openaire   +1 more source

An Improved Security Protocol Formal Analysis with BAN Logic

2009 International Conference on Electronic Commerce and Business Intelligence, 2009
BAN logic can prove whether a protocol can reach expected target and find some flaws in the protocol. The paper analyzed constitute of BAN logic and analysis steps. On the basis of the above work, BAN logic was used to construct an ideal model of the improved NSSK protocol and the security of the NSSK protocol was analyzed with the initial hypothesis ...
Li Tingyuan   +3 more
openaire   +1 more source

Extending BAN Logic for Reasoning with Modern PKI-Based Protocols

2008 IFIP International Conference on Network and Parallel Computing, 2008
BAN logic is a well-known authentication logic which, despite other more recent logics and formal methods, remains popular with many protocol designers. BAN Logic however does not properly deal with the issues of certificates and the use of public key infrastructure (PKI).
null Sufatrio, Roland H. C. Yap
openaire   +1 more source

Validating the Use of BAN LOGIC

2004
Most attacks against security protocols are due to their vulnerable designs. These type of protocols are usually the base which many other protocols and applications are built upon, so proving the correctness of such protocols has become a very important issue in recent years.
José M. Sierra   +3 more
openaire   +1 more source

The Security Analysis on Otway-Rees Protocol Based on BAN Logic

2012 Fourth International Conference on Computational and Information Sciences, 2012
This paper analyzes the Otway-Rees protocol based on BAN logic after has introducing the BAN logic. It has verified that the BAN logic can be used formally and prove the correctness and security of the protocols, which indicates that BAN logic is an important tool for analyzing cryptographic protocols. The paper has established the ideal protocol model
Kening Liu, Junyao Ye, Yinglian Wang
openaire   +1 more source

Home - About - Disclaimer - Privacy