The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the last few years, researchers have extensively studied the key exchange protocol. In 2007, Kwon et al. proposed a simple three-step key exchange protocol using smart card. In 2008, Chen and Lee proposed a secure and efficient user authentication scheme using smart card that is modified to enhance the security of the series of the Peyravian-Zunic scheme. The current paper demonstrates the vulnerability...
In this paper, we propose a secure binding update authentication scheme in FMIPv6 for wireless vehicular networks. The scheme guarantees mutual authentication, secrecy, and integrity based on pre-authentication. We analyze the security of the binding update authentication scheme and the security requirements using AVISPA Tool that supports a rigorous analysis of security.
In 2005, Lee et al. (S.W. Lee, H.S. Kim, K.Y. Yoo, Efficient verifier-based key agreement protocol for three parties without server's public key, Applied Mathematics and Computation 167) proposed a efficient verifier-based key agreement protocol for three parties which does not require server's public key. However, we find that the protocol is susceptible to an impersonation-of-initiator attack and...
RFID technology has become one of the most hotly debated ubiquitous computing technologies, and public fears of its alleged capability for comprehensive surveillance have prompted a flurry of research trying to alleviate such concerns. Security mechanisms for RFID systems are therefore of utmost important. In this paper, we describe problems of previous work on RFID security protocols and specify...
A radio frequency identification (RFID) is an important part in mobile and ubiquitous domain, and brings enormous productivity benefits in applications where objects require automatic identification. However, this pervasive use of RFID tags opens up the possibility of various attacks that violate user privacy and authentication. Security mechanisms for RFID systems are therefore of the utmost important...
The threat of invasion of privacy and of the illegal appropriation of information both increase with the expansion of the biometrics service environment to open systems. However, while certificates or smart cards can easily be cancelled and reissued if found to be missing, there is no way to recover the unique biometric information of an individual following a security breach. For this reason, confidence...
In spite of application potentiality of RFID technology is un-describable, the RFID system has several privacy related problems such as the data leakage and data traceability which should be resolved before its pervasive employment. For this reason, a security protocol for the RFID system protection is considered to be the best solution to prevent the privacy related problems. However, previously...
RFID(Radio Frequency Identification) has the potential to be efficiently used for object identification and most likely a majority of items in the supply chain will carry RFID labels in the future. However, widespread deployment of RFID tags may create new threats to user privacy due to the powerful tracking capability of the tags and drawbacks in authentication systems between reader and tag. Security...
Radio frequency identification (RFID) systems will soon become an important part of everyday life. However, widespread deployment of RFID tags may create new threats to user privacy, due to the powerful tracking capability of the tags. Security mechanisms for RFID systems will be therefore of utmost importance. In this paper, we describe problems of previous works on RFID security protocol and specify...
Software streaming is an emerging technology that enables SAV applications to be executed on-demand without download and installation, so that the applications are available virtually everywhere in the network. In developing software streaming systems, the engine and protocols must be carefully designed since the performance and reliability of the streamed software are directly affected by that of...
The common electronic purse specifications (CEPS) was created as a globally interoperable electronic purse standard. However, it is also well known that numerous significant errors have been found in the design of e-commerce protocols. In this paper model-based verification using Casper, CSP and FDR is addressed, demonstrating how the secrecy properties in the CEPS can be achieved. Vulnerabilities...
Generally, security protocols have been designed and verified using informal techniques. In the result, it is now well recognized that many security protocols which were previously proposed have found to be vulnerable later on. In this paper, we model and verify of the ASK protocol, which is a complicated mobile security protocol. After showing the vulnerability of the ASK protocol using formal verification...
Owing to the explosive growth of the Internet, various electronic payment systems have been studied and suggested. The security of electronic payment protocols is of particular interest to researchers in academia and industry. However, current electronic cash protocols are not offering adequate security of user information. The BCY protocols (Beller, Chang, and Yacov) are electronic commerce protocols...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.