Authentication protocols for internet of things: a comprehensive survey
In this paper, a comprehensive survey of authentication protocols for Internet of Things (IoT)
is presented. Specifically more than forty authentication protocols developed for or applied …
is presented. Specifically more than forty authentication protocols developed for or applied …
Universally composable security: A new paradigm for cryptographic protocols
R Canetti - Proceedings 42nd IEEE Symposium on Foundations …, 2001 - ieeexplore.ieee.org
We propose a novel paradigm for defining security of cryptographic protocols, called
universally composable security. The salient property of universally composable definitions …
universally composable security. The salient property of universally composable definitions …
[BOOK][B] Communicating and mobile systems: the pi calculus
R Milner - 1999 - books.google.com
Communication is a fundamental and integral part of computing, whether between different
computers on a network, or between components within a single computer. In this book …
computers on a network, or between components within a single computer. In this book …
[BOOK][B] Life itself: a comprehensive inquiry into the nature, origin, and fabrication of life
R Rosen - 1991 - books.google.com
Why are living things alive? As a theoretical biologist, Robert Rosen saw this as the most
fundamental of all questions-and yet it had never been answered satisfactorily by science …
fundamental of all questions-and yet it had never been answered satisfactorily by science …
Language-based information-flow security
Current standard security practices do not provide substantial assurance that the end-to-end
behavior of a computing system satisfies important security policies such as confidentiality …
behavior of a computing system satisfies important security policies such as confidentiality …
[BOOK][B] The pi-calculus: a Theory of Mobile Processes
D Sangiorgi, D Walker - 2003 - books.google.com
Mobile systems, whose components communicate and change their structure, now pervade
the informational world and the wider world of which it is a part. The science of mobile …
the informational world and the wider world of which it is a part. The science of mobile …
Security protocol verification: Symbolic and computational models
B Blanchet - International conference on principles of security and …, 2012 - Springer
Security protocol verification has been a very active research area since the 1990s. This
paper surveys various approaches in this area, considering the verification in the symbolic …
paper surveys various approaches in this area, considering the verification in the symbolic …
Mobile values, new names, and secure communication
We study the interaction of the" new" construct with a rich but common form of (first-order)
communication. This interaction is crucial in security protocols, which are the main …
communication. This interaction is crucial in security protocols, which are the main …
Modeling and verifying security protocols with the applied pi calculus and ProVerif
B Blanchet - Foundations and Trends® in Privacy and …, 2016 - nowpublishers.com
ProVerif is an automatic symbolic protocol verifier. It supports a wide range of cryptographic
primitives, defined by rewrite rules or by equations. It can prove various security properties …
primitives, defined by rewrite rules or by equations. It can prove various security properties …
Mobile ambients
Mobile ambients Page 1 Mobile Ambients Luca Cardelli* Digital Equipment Corporation
Systems Research Center Andrew D. Gordon* University of Cambridge Computer Laboratory …
Systems Research Center Andrew D. Gordon* University of Cambridge Computer Laboratory …