Formal Proof of Cooperativeness in a Multi–Party P2P Content Authentication Protocol

Author(s):  
Almudena Alcaide ◽  
Esther Palomar ◽  
Ana I. González–Tablas ◽  
Arturo Ribagorda
Author(s):  
Esther Palomar ◽  
Juan M. Estevez-Tapiador ◽  
Julio C. Hernandez-Castro ◽  
Arturo Ribagorda

2013 ◽  
Vol 427-429 ◽  
pp. 2403-2407
Author(s):  
She Qiang Peng ◽  
Long Wang

To address the security problems caused by the fake readers, and the weakness of low authentication protocol efficiency, a new RFID security authentication protocol based on Hash function is proposed. The security ability of the protocol is compared with other protocols' and is proved by doing the formal analysis. The theoretical analysis and formal proof is presented to prove the security ability of the protocol. Consequently, the result showed that the new protocol could protect the data privacy, achieve the data synchronization, prevent the tag from location tracking, avoid information reproduction, prevent clone and counterfeit and possess forward security ability which was useful for low-cost tags.


Author(s):  
Chandrashekhar Meshram ◽  
Sarita Gajbhiye Meshram ◽  
Rabha W. Ibrahim ◽  
Hamid A. Jalab ◽  
Sajjad Shaukat Jamal ◽  
...  

AbstractWith the rapid advancement and growth of computer networks, there have been greater and greater demands for remote user password authentication protocols. In current ages, smartcard-based authentication protocol has formed the standard with their incredibly insubstantial, user-friendly equipment and low-cost apps. In this study, we proposed an effective robust authentication protocol using the conformable chaotic map, where a conformable calculus is a branch of newly appearing fractional calculus. It has a magnificent property, because it formulates using a controller term. We shall also offer formal proof of smooth execution of the proposed authenticated protocol. Our new protocol is more secure as compared to several comparable protocols.


Author(s):  
Rob Nederpelt ◽  
Herman Geuvers
Keyword(s):  

2008 ◽  
Vol 67 (19) ◽  
pp. 1777-1790 ◽  
Author(s):  
C. Cruz-Ramos ◽  
R. Reyes-Reyes ◽  
J. Mendoza-Noriega ◽  
Mariko Nakano-Miyatake ◽  
Hector Manuel Perez-Meana

2019 ◽  
Vol 15 (4) ◽  
pp. 784-794
Author(s):  
N.V. Kormil'tsev ◽  
◽  
A.D. Uvarov ◽  
A.A. Mikhailov ◽  
M.V. Tumbinskaya ◽  
...  

2019 ◽  
Vol 7 (5) ◽  
pp. 1551-1557
Author(s):  
Arif Mohammad Abdul ◽  
Sudarson Jena ◽  
M Bal Raju

2017 ◽  
Vol 9 (1) ◽  
pp. 30-35
Author(s):  
Sunderi Pranata ◽  
Hargyo Tri Nugroho ◽  
Hirofumi Yamaki

It is known that password itself is not enough for formidable authentication method since it has a lot of vulnerabilities. Multi factor authentication (MFA) is introduced for the next generation for good authentication to address that issue. MFA combines two or more of three principles of good security, “something you know”, “something you have”, and “something you are”. Most MFA mechanisms work as one time passwords (OTP). However, they can still be vulnerable to phishing and MiTM attack. On top of that, OTP can be hard to use as it requires user to input another password given by the device (SMS, token, authenticator). Implemented in small USB U2F device, FIDO U2F delivers easier yet stronger security on authentication process which implements public key cryptography, challenge-response protocol, and phishing and MitM protection.  Index Terms— Authentication protocol, FIDO U2F, Multi factor authentication, OTP


Sign in / Sign up

Export Citation Format

Share Document