Authentication protocols for internet of things: a comprehensive survey

MA Ferrag, LA Maglaras, H Janicke… - Security and …, 2017 - Wiley Online Library
In this paper, a comprehensive survey of authentication protocols for Internet of Things (IoT)
is presented. Specifically more than forty authentication protocols developed for or applied …

Universally composable security: A new paradigm for cryptographic protocols

R Canetti - Proceedings 42nd IEEE Symposium on Foundations …, 2001 - ieeexplore.ieee.org
We propose a novel paradigm for defining security of cryptographic protocols, called
universally composable security. The salient property of universally composable definitions …

[BOOK][B] Communicating and mobile systems: the pi calculus

R Milner - 1999 - books.google.com
Communication is a fundamental and integral part of computing, whether between different
computers on a network, or between components within a single computer. In this book …

[BOOK][B] Life itself: a comprehensive inquiry into the nature, origin, and fabrication of life

R Rosen - 1991 - books.google.com
Why are living things alive? As a theoretical biologist, Robert Rosen saw this as the most
fundamental of all questions-and yet it had never been answered satisfactorily by science …

Language-based information-flow security

A Sabelfeld, AC Myers - IEEE Journal on selected areas in …, 2003 - ieeexplore.ieee.org
Current standard security practices do not provide substantial assurance that the end-to-end
behavior of a computing system satisfies important security policies such as confidentiality …

[BOOK][B] The pi-calculus: a Theory of Mobile Processes

D Sangiorgi, D Walker - 2003 - books.google.com
Mobile systems, whose components communicate and change their structure, now pervade
the informational world and the wider world of which it is a part. The science of mobile …

Security protocol verification: Symbolic and computational models

B Blanchet - International conference on principles of security and …, 2012 - Springer
Security protocol verification has been a very active research area since the 1990s. This
paper surveys various approaches in this area, considering the verification in the symbolic …

Mobile values, new names, and secure communication

M Abadi, C Fournet - ACM Sigplan Notices, 2001 - dl.acm.org
We study the interaction of the" new" construct with a rich but common form of (first-order)
communication. This interaction is crucial in security protocols, which are the main …

Modeling and verifying security protocols with the applied pi calculus and ProVerif

B Blanchet - Foundations and Trends® in Privacy and …, 2016 - nowpublishers.com
ProVerif is an automatic symbolic protocol verifier. It supports a wide range of cryptographic
primitives, defined by rewrite rules or by equations. It can prove various security properties …

Mobile ambients

L Cardelli, AD Gordon - … Conference on Foundations of Software Science …, 1998 - Springer
Mobile ambients Page 1 Mobile Ambients Luca Cardelli* Digital Equipment Corporation
Systems Research Center Andrew D. Gordon* University of Cambridge Computer Laboratory …