OFMC: A symbolic model checker for security protocols
We present the on-the-fly model checker OFMC, a tool that combines two ideas for analyzing
security protocols based on lazy, demand-driven search. The first is the use of lazy data …
security protocols based on lazy, demand-driven search. The first is the use of lazy data …
A comparative survey on lightweight block ciphers for resource constrained applications
Information security for low-resource devices has received a fair amount of attention in
recent years. These devices have physical constraint in terms of area, power, and memory …
recent years. These devices have physical constraint in terms of area, power, and memory …
YAPA: A generic tool for computing intruder knowledge
Reasoning about the knowledge of an attacker is a necessary step in many formal analyses
of security protocols. In the framework of the applied pi-calculus, as in similar languages …
of security protocols. In the framework of the applied pi-calculus, as in similar languages …
Tree automata with one memory set constraints and cryptographic protocols
We introduce a class of tree automata that perform tests on a memory that is updated using
function symbol application and projection. The language emptiness problem for this class …
function symbol application and projection. The language emptiness problem for this class …
Computationally sound implementations of equational theories against passive adversaries
In this paper we study the link between formal and cryptographic models for security
protocols in the presence of a passive adversary. In contrast to other works, we do not …
protocols in the presence of a passive adversary. In contrast to other works, we do not …
Symbolic bisimulation in the spi calculus
The spi calculus is an executable model for the description and analysis of cryptographic
protocols. Security objectives like secrecy and authenticity can be formulated as equations …
protocols. Security objectives like secrecy and authenticity can be formulated as equations …
Formal verification of LTE-UMTS and LTE–LTE handover procedures
Abstract Long Term Evolution (LTE) is the most recent standard in mobile communications,
introduced by 3rd Generation Partnership Project (3GPP). Most of the works in literature …
introduced by 3rd Generation Partnership Project (3GPP). Most of the works in literature …
[PDF][PDF] Formal analysis of optimistic fair exchange protocols
S Kremer - Universit'e Libre de Bruxelles Facult'e des Sciences, 2003 - Citeseer
Security of information has become of increasing importance in today's information society.
Sensitive information such as credit card numbers is sent over the Internet every day …
Sensitive information such as credit card numbers is sent over the Internet every day …
A robust, low-cost and secure authentication scheme for IoT applications
The edge devices connected to the Internet of Things (IoT) infrastructures are increasingly
susceptible to piracy. These pirated edge devices pose a serious threat to security, as an …
susceptible to piracy. These pirated edge devices pose a serious threat to security, as an …
Security analysis of civil registry database of Ecuador
SMT Toapanta, LEM Gallegos… - … Conference on Electrical …, 2016 - ieeexplore.ieee.org
It considers at this stage to define the structure of reliability and safe future identification
system and develop or adopt appropriate algorithms and security protocols to cover …
system and develop or adopt appropriate algorithms and security protocols to cover …