At NDSS 2012, Yan et al. analyzed the security of several challenge-response type user authentication protocols against passive observers, and proposed a generic counting based statistical attack to recover the secret of some counting based protocols given a number of observed authentication sessions. Roughly speaking, the attack is based on the fact that secret (pass) objects appear in challenges with a different probability from non-secret (decoy) objects when the responses are taken into account. Although they mentioned that a protocol susceptible to this attack should minimize this difference, they did not give details as to how this can be achieved barring a few suggestions. In this paper, we attempt to fill this gap by generalizing t...
Graduation date: 2007Authentication protocols play important roles in network security. A variety of...
Distance-bounding protocols form a family of challenge–response authentication protocols that have b...
Thesis (PhD)--Macquarie University, Faculty of Science, Dept. of Computing, 2012.Bibliography: p. 14...
At NDSS 2012, Yan et al. analyzed the security of several challenge-response type user authenticatio...
At NDSS 2012, Yan et al. analyzed the security of several challenge-response type user authenticatio...
At NDSS 2012, Yan et al. analyzed the security of sev-eral challenge-response type user authenticati...
Cryptographic identification protocols enable a prover to prove its identity to a verifier. A subcla...
Passwords are used for user authentication by almost every Internet service today, despite a number ...
Authentication protocols are designed to work correctly in the presence of an adversary that can pro...
AbstractCurrent research on UHF RFID system security mainly focus on protecting communication safety...
We consider two basic versions of the challenge-response authentication protocol, and exhibit both a...
In this work, we argue that the usage of computationally intensive mathematical operations in passwo...
Automated Turing Tests (ATTs), also known as human-in-the-loop techniques, were recently employed in...
International audienceBounding the number of sessions is a long-standing problem in the context of s...
Distance-bounding protocols form a family of challenge-response authentication protocols that have b...
Graduation date: 2007Authentication protocols play important roles in network security. A variety of...
Distance-bounding protocols form a family of challenge–response authentication protocols that have b...
Thesis (PhD)--Macquarie University, Faculty of Science, Dept. of Computing, 2012.Bibliography: p. 14...
At NDSS 2012, Yan et al. analyzed the security of several challenge-response type user authenticatio...
At NDSS 2012, Yan et al. analyzed the security of several challenge-response type user authenticatio...
At NDSS 2012, Yan et al. analyzed the security of sev-eral challenge-response type user authenticati...
Cryptographic identification protocols enable a prover to prove its identity to a verifier. A subcla...
Passwords are used for user authentication by almost every Internet service today, despite a number ...
Authentication protocols are designed to work correctly in the presence of an adversary that can pro...
AbstractCurrent research on UHF RFID system security mainly focus on protecting communication safety...
We consider two basic versions of the challenge-response authentication protocol, and exhibit both a...
In this work, we argue that the usage of computationally intensive mathematical operations in passwo...
Automated Turing Tests (ATTs), also known as human-in-the-loop techniques, were recently employed in...
International audienceBounding the number of sessions is a long-standing problem in the context of s...
Distance-bounding protocols form a family of challenge-response authentication protocols that have b...
Graduation date: 2007Authentication protocols play important roles in network security. A variety of...
Distance-bounding protocols form a family of challenge–response authentication protocols that have b...
Thesis (PhD)--Macquarie University, Faculty of Science, Dept. of Computing, 2012.Bibliography: p. 14...