An active attack on the token-based security protocol

被引:0
|
作者
Abdelshafy, M.A. [1 ]
Elsaholy, M.S. [1 ]
Darwish, M.G. [1 ]
机构
[1] Higher Technological Institute, Ramadan City, Egypt
来源
关键词
Logical analysis - Security protocols;
D O I
暂无
中图分类号
学科分类号
摘要
引用
下载
收藏
页码:365 / 383
相关论文
共 50 条
  • [21] Token-based platform finance *
    Cong, Lin William
    Li, Ye
    Wang, Neng
    JOURNAL OF FINANCIAL ECONOMICS, 2022, 144 (03) : 972 - 991
  • [22] Token-Based Access Control
    Gan, Guohua
    Chen, E.
    Zhou, Zhiyuan
    Zhu, Yan
    IEEE ACCESS, 2020, 8 (08): : 54189 - 54199
  • [23] STCA: Stacked Token-based Continuous Authentication Protocol for Zero Trust IoT
    Zhang, Biao
    Yang, Shuo
    Zheng, Xinran
    Wang, Xingjun
    2024 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, WCNC 2024, 2024,
  • [24] Token-Based Coordination in Multiagent Organization
    Kyaw, Thiri Haymar
    Thein, Ni Lar
    PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 5, 2010, : 393 - 397
  • [25] Token-Based Security for the Internet of Things With Dynamic Energy-Quality Tradeoff
    Aman, Muhammad Naveed
    Taneja, Sachin
    Sikdar, Biplab
    Chua, Kee Chaing
    Alioto, Massimo
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (02) : 2843 - 2859
  • [26] A new resource sharing protocol in the light of token-based strategy for distributed system
    Parihar, Ashish Singh
    Chakraborty, Swarnendu Kumar
    INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2023, 26 (01) : 78 - 89
  • [27] Token-based access to digital information
    Holmquist, LE
    Redström, J
    Ljungstrand, P
    HANDHELD AND UBIQUITOUS COMPUTING, PROCEEDINGS, 1999, 1707 : 234 - 245
  • [28] Token-based Sharing Control for IPFS
    Ohashi, Shigenori
    Watanabe, Hiroki
    Ishida, Tatsuro
    Fujimura, Shigeru
    Nakadaira, Atsushi
    Kishigami, Junichi
    2019 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN (BLOCKCHAIN 2019), 2019, : 361 - 367
  • [29] Token-Based Function Computation with Memory
    Salehkaleybar, Saber
    Golestani, S. Jamaloddin
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2016, 27 (06) : 1811 - 1823
  • [30] Token-based graphical password authentication
    John Charles Gyorffy
    Andrew F. Tappenden
    James Miller
    International Journal of Information Security, 2011, 10 : 321 - 336