Authentication protocols based on low-bandwidth unspoofable channels: a comparative survey

LH Nguyen, AW Roscoe - Journal of Computer Security, 2011 - content.iospress.com
One of the main challenges in pervasive computing is how we can establish secure
communication over an untrusted high-bandwidth network without any initial knowledge or a …

Secure scalar product protocols

LI Shundong, Z Mengyu… - Chinese Journal of …, 2021 - Wiley Online Library
Secure scalar product computation is a special secure multi‐party computation problem. A
secure scalar product protocol can be used by two parties to jointly compute the scalar …

Non-interactive key establishment for bundle security protocol of space DTNs

X Lv, Y Mu, H Li - IEEE transactions on information forensics …, 2013 - ieeexplore.ieee.org
To ensure the authenticity, integrity, and confidentiality of bundles, the in-transit Protocol
Data Units of bundle protocol (BP) in space delay/disruption tolerant networks (DTNs), the …

Improved multicast key management of Chinese wireless local area network security standard

L Pang, H Li, Q Pei - IET communications, 2012 - IET
Multicasting is an important business in the field of the wireless local area network (WLAN),
because the access point (AP) usually has to send the same message to each station (STA) …

User-aided data authentication

S Laur, S Pasini - International Journal of Security and …, 2009 - inderscienceonline.com
All classical authentication protocols are based on pre-shared authentic information such as
long-term secret keys or a public key infrastructure. However, there are many practical …

Detecting failed attacks on human-interactive security protocols

AW Roscoe - Security Protocols XXIV: 24th International Workshop …, 2017 - Springer
One of the main challenges in pervasive computing is how we can establish secure
communication over an untrusted high-bandwidth network without any initial knowledge or a …

Formal unlinkability analysis of message authentication protocols based on authentic channels

MR Alagheband, A Mashatan - The Journal of Supercomputing, 2023 - Springer
In today's technological world, low-cost devices have become a mainstream technology in
the Internet-of-Thing (IoT) systems. Short-distance communication methods, such as …

Practical unconditionally secure two-channel message authentication

A Mashatan, DR Stinson - Designs, Codes and Cryptography, 2010 - Springer
We investigate unconditional security for message authentication protocols that are
designed using two-channel cryptography.(Two-channel cryptography employs a …

A new message recognition protocol for ad hoc pervasive networks

A Mashatan, DR Stinson - … Conference, CANS 2008, Hong-Kong, China …, 2008 - Springer
We propose a message recognition protocol which is suitable for ad hoc pervasive networks
without the use of hash chains. Hence, we no longer require the devices to save values of a …

Interactive two-channel message authentication based on interactive-collision resistant hash functions

A Mashatan, DR Stinson - International Journal of Information Security, 2009 - Springer
Abstract We propose an Interactive Message Authentication Protocol (IMAP) using two
channels; an insecure broadband channel and an authenticated narrow-band channel. We …