The applied pi calculus: Mobile values, new names, and secure communication

M Abadi, B Blanchet, C Fournet - Journal of the ACM (JACM), 2017 - dl.acm.org
We study the interaction of the programming construct “new,” which generates statically
scoped names, with communication via messages on channels. This interaction is crucial in …

A security framework for the internet of things in the future internet architecture

X Liu, M Zhao, S Li, F Zhang, W Trappe - Future Internet, 2017 - mdpi.com
The Internet of Things (IoT) is a recent trend that extends the boundary of the Internet to
include a wide variety of computing devices. Connecting many stand-alone IoT systems …

Secure authentication scheme for medicine anti-counterfeiting system in IoT environment

M Wazid, AK Das, MK Khan… - IEEE Internet of …, 2017 - ieeexplore.ieee.org
A counterfeit drug is a medication or pharmaceutical product which is manufactured and
made available on the market to deceptively represent its origin, authenticity and …

Provably secure password authenticated key exchange based on RLWE for the post-quantum world

J Ding, S Alsayigh, J Lancrenon, S Rv… - Cryptographers' Track at …, 2017 - Springer
Abstract Authenticated Key Exchange (AKE) is a cryptographic scheme with the aim to
establish a high-entropy and secret session key over a insecure communications network …

Symbolic and computational mechanized verification of the ARINC823 avionic protocols

B Blanchet - 2017 IEEE 30th computer security foundations …, 2017 - ieeexplore.ieee.org
We present the first formal analysis of two avionic protocols that aim to secure air-ground
communications, the ARINC823 public-key and shared-key protocols. We verify these …

Establishing mutually trusted channels for remote sensing devices with trusted execution environments

C Shepherd, RN Akram, K Markantonakis - Proceedings of the 12th …, 2017 - dl.acm.org
Remote and largely unattended sensing devices are being deployed rapidly in sensitive
environments, such as healthcare, in the home, and on corporate premises. A major …

Sepcar: A secure and privacy-enhancing protocol for car access provision

I Symeonidis, A Aly, MA Mustafa, B Mennink… - … –ESORICS 2017: 22nd …, 2017 - Springer
We present an efficient secure and privacy-enhancing protocol for car access provision,
named SePCAR. The protocol is fully decentralised and allows users to share their cars …

[PDF][PDF] A study on diffie-hellman key exchange protocols

MR Mishra, J Kar - International Journal of Pure and Applied …, 2017 - researchgate.net
Securing network traffic has always been a must requirement for any network application
that employs insecure communication channel. The reason is to provide protection for the …

Cryptography with updates

P Ananth, A Cohen, A Jain - … International Conference on the Theory and …, 2017 - Springer
Starting with the work of Bellare, Goldreich and Goldwasser [CRYPTO'94], a rich line of work
has studied the design of updatable cryptographic primitives. For example, in an updatable …

Evaluating web pkis

J Yu, M Ryan - Software Architecture for Big Data and the Cloud, 2017 - Elsevier
Certificate authorities serve as trusted parties to help secure web communications. They are
a vital component for ensuring the security of cloud infrastructures and big data repositories …