Abstract
By Ahmed M. El-Nagar, Ahmed A. Abd El-hafez & 1 more. A new Extensible Authentication Protocol-Moderate Weight Extensible Authentication Protocol (EAP-MEAP) is proposed and properties were verified using the specialized model checker AVISPA.
Highlights
B -> A : {Start,Sid}(Sessionk((Ks),(Hash((Ks),Nc)))) 9.A ->B : {Sid,Nd} (Sessionk((Ks),(Hash((Ks),Nc)))) 10.B -> A :{Connected}(Nsessionk((Ks),(Hasha((Ks),Nd)))) 11.A ->B :{Connected,Ok}(Nsessionk((Ks),(Hasha((Ks),Nd)))) knowledge A :B,Ks,Id,Password,Meap; B :A,Ks,Hello; session_instances [A:client,B:server,Hash:kd,Ks:ks,Start:start,Ok:ok,Id:id,Password:password,Con nected:connected,Sessionk:ke,Hasha:kc,Nsessionk:kn,Sid:sid]; intruder_knowledge client, server; goal B authenticates A on Na; A authenticates B on Nb; secrecy_of Password [ A,B]; secrecy_of Id [ A,B]; secrecy_of Sid []; secrecy_of Start [ ]; secrecy_of Ok[A,B]; secrecy_of Connected []; 10
القوات المسلحة ،جمهورية مصر العربية الكلية الفنية العسكرية ،جمهورية مصر العربية جامعة عين شمس ،جمهورية مصر العربية الملخص:
Summary
Public-Key (Certificated) Approach EAP-TLS (EAP-Transport Layer Security)
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.