Learn More
Beller, Chang and Yacobi [2] have recently proposed a set of secret key and public key protocols to meet authentication and privacy requirements for conversation set-up protocols for the initiating party of portable communication systems. This paper improves upon the protocols to obtain a higher assurance of authentication and key distribution. Conversation(More)
This paper describes a tool which translates a cryptographic protocol specified in the semi-formal standard notation i . A+B : M into the formal language C K T S . W e examine the standard notation syntax, and describe how it is exploited by the tool t o infer protocol conditions which must hold f o r every principal, thereby obtaining a complete, formal(More)
Critical issues in the acceptance of wireless services are the authentication and authorisation to these services. This paper presents the SIM as device for Mobile phone/SIM card based authentication. The mobile phone can be used for physical access (admittance) and service access using near field communication (NFC). It has the potential becoming the(More)
Although about three million computers get sold every year in China, people don't pay for the software. Someday they will, though. And as long as they're going to steal it, we want them to steal ours. They'll get sort of addicted, and then we'll somehow figure how to collect sometime in the next decade. Remerciements Même si une thèse est un travail(More)
  • 1