By Topic

An Improvement Key Distribution Protocol and Its BAN Analysis

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Shi Shi-ying ; Dept of Inf. Eng., Shan-dong Jiaotong Univ., Jinan, China ; Mao Yu-Ming

This paper mainly discusses the role of formal analysis in the design of the authentication protocols function; in allusion to Needham-Schroeder Protocol with shared key and Otway-Rees Protocol , this paper propose a new authentication protocol and then analyze it using BAN logic, according to the result of formal analysis, paper show an attack mode to the protocol and point out that formal analysis is helpful for the design of protocol ; Article final discussion this kind of analysis function, limitation as well as improvement direction.

Published in:

Future Computer and Communication, 2009. ICFCC 2009. International Conference on

Date of Conference:

3-5 April 2009