Survey on the authentication and key agreement of 6LoWPAN: Open issues and future direction
The advent of the Internet of Things (IoT) technology and the term “connect everything to
everything” bring up a new standard for IPv6 over Low-power Wireless Personal Area …
everything” bring up a new standard for IPv6 over Low-power Wireless Personal Area …
Secure coding practices in java: Challenges and vulnerabilities
The Java platform and its third-party libraries provide useful features to facilitate secure
coding. However, misusing them can cost developers time and effort, as well as introduce …
coding. However, misusing them can cost developers time and effort, as well as introduce …
Unveiling the mystery of internet packet forwarding: A survey of network path validation
Validating the network paths taken by packets is critical in constructing a secure Internet
architecture. Any feasible solution must both enforce packet forwarding along end-host …
architecture. Any feasible solution must both enforce packet forwarding along end-host …
Towards a formal foundation of web security
We propose a formal model of web security based on an abstraction of the web platform and
use this model to analyze the security of several sample web mechanisms and applications …
use this model to analyze the security of several sample web mechanisms and applications …
[LIVRE][B] Security properties
Security Properties | SpringerLink Skip to main content Advertisement SpringerLink Account
Menu Find a journal Publish with us Track your research Search Cart Book cover …
Menu Find a journal Publish with us Track your research Search Cart Book cover …
Refinement types for secure implementations
We present the design and implementation of a typechecker for verifying security properties
of the source code of cryptographic protocols and access control mechanisms. The …
of the source code of cryptographic protocols and access control mechanisms. The …
Why does cryptographic software fail? A case study and open problems
Mistakes in cryptographic software implementations often undermine the strong security
guarantees offered by cryptography. This paper presents a systematic study of cryptographic …
guarantees offered by cryptography. This paper presents a systematic study of cryptographic …
The foundational cryptography framework
A Petcher, G Morrisett - Principles of Security and Trust: 4th International …, 2015 - Springer
Abstract We present the Foundational Cryptography Framework (FCF) for develo** and
checking complete proofs of security for cryptographic schemes within a proof assistant. This …
checking complete proofs of security for cryptographic schemes within a proof assistant. This …
A mutual authentication and key establishment scheme for M2M communication in 6LoWPAN networks
The machine-to-machine (M2M) communication, which plays a vital role in the Internet of
Things (IoT), allows wireless and wired systems to monitor environments and exchange the …
Things (IoT), allows wireless and wired systems to monitor environments and exchange the …
A survey of symbolic methods in computational analysis of cryptographic systems
Since the 1980s, two approaches have been developed for analyzing security protocols.
One of the approaches relies on a computational model that considers issues of complexity …
One of the approaches relies on a computational model that considers issues of complexity …