Scyther: Semantics and verification of security protocols
CJF Cremers - 2006 - research.tue.nl
Recent technologies have cleared the way for large scale application of electronic
communication. The open and distributed nature of these communications implies that the …
communication. The open and distributed nature of these communications implies that the …
Formal security analysis of LoRaWAN
Abstract Recent Low Power Wide Area Networks (LPWAN) protocols are receiving
increased attention from industry and academia to offer accessibility for Internet of Things …
increased attention from industry and academia to offer accessibility for Internet of Things …
[LIVRE][B] Security properties
Security Properties | SpringerLink Skip to main content Advertisement SpringerLink Account
Menu Find a journal Publish with us Track your research Search Cart Book cover …
Menu Find a journal Publish with us Track your research Search Cart Book cover …
A lightweight continuous authentication protocol for the Internet of Things
YH Chuang, NW Lo, CY Yang, SW Tang - Sensors, 2018 - mdpi.com
Modern societies are moving toward an information-oriented environment. To gather and
utilize information around people's modern life, tiny devices with all kinds of sensing devices …
utilize information around people's modern life, tiny devices with all kinds of sensing devices …
Vulnerability and impact analysis of the IEC 61850 GOOSE protocol in the smart grid
IEC 61850 is one of the most prominent communication standards adopted by the smart grid
community due to its high scalability, multi-vendor interoperability, and support for several …
community due to its high scalability, multi-vendor interoperability, and support for several …
A lightweight privacy-preserving communication protocol for heterogeneous IoT environment
While Internet-of-Things (IoT) significantly facilitates the convenience of people's daily life,
the lack of security practice raises the risk of privacy-sensitive user data leakage. Securing …
the lack of security practice raises the risk of privacy-sensitive user data leakage. Securing …
Provably repairing the ISO/IEC 9798 standard for entity authentication
We formally analyze the family of entity authentication protocols defined by the ISO/IEC 9798
standard and find numerous weaknesses, both old and new, including some that violate …
standard and find numerous weaknesses, both old and new, including some that violate …
Comparing state spaces in automatic security protocol analysis
There are several automatic tools available for the symbolic analysis of security protocols.
The models underlying these tools differ in many aspects. Some of the differences have …
The models underlying these tools differ in many aspects. Some of the differences have …
An authentication protocol for future sensor networks
M Bilal, SG Kang - Sensors, 2017 - mdpi.com
Authentication is one of the essential security services in Wireless Sensor Networks (WSNs)
for ensuring secure data sessions. Sensor node authentication ensures the confidentiality …
for ensuring secure data sessions. Sensor node authentication ensures the confidentiality …
Security analysis of automotive protocols
The technology of modern vehicles is currently undergoing a major transformation with
increased communication and the introduction of new protocols. It is essential that these …
increased communication and the introduction of new protocols. It is essential that these …