The applied pi calculus: Mobile values, new names, and secure communication
We study the interaction of the programming construct “new,” which generates statically
scoped names, with communication via messages on channels. This interaction is crucial in …
scoped names, with communication via messages on channels. This interaction is crucial in …
A security framework for the internet of things in the future internet architecture
The Internet of Things (IoT) is a recent trend that extends the boundary of the Internet to
include a wide variety of computing devices. Connecting many stand-alone IoT systems …
include a wide variety of computing devices. Connecting many stand-alone IoT systems …
Secure authentication scheme for medicine anti-counterfeiting system in IoT environment
A counterfeit drug is a medication or pharmaceutical product which is manufactured and
made available on the market to deceptively represent its origin, authenticity and …
made available on the market to deceptively represent its origin, authenticity and …
Provably secure password authenticated key exchange based on RLWE for the post-quantum world
Abstract Authenticated Key Exchange (AKE) is a cryptographic scheme with the aim to
establish a high-entropy and secret session key over a insecure communications network …
establish a high-entropy and secret session key over a insecure communications network …
Symbolic and computational mechanized verification of the ARINC823 avionic protocols
B Blanchet - 2017 IEEE 30th computer security foundations …, 2017 - ieeexplore.ieee.org
We present the first formal analysis of two avionic protocols that aim to secure air-ground
communications, the ARINC823 public-key and shared-key protocols. We verify these …
communications, the ARINC823 public-key and shared-key protocols. We verify these …
Establishing mutually trusted channels for remote sensing devices with trusted execution environments
Remote and largely unattended sensing devices are being deployed rapidly in sensitive
environments, such as healthcare, in the home, and on corporate premises. A major …
environments, such as healthcare, in the home, and on corporate premises. A major …
Sepcar: A secure and privacy-enhancing protocol for car access provision
We present an efficient secure and privacy-enhancing protocol for car access provision,
named SePCAR. The protocol is fully decentralised and allows users to share their cars …
named SePCAR. The protocol is fully decentralised and allows users to share their cars …
[PDF][PDF] A study on diffie-hellman key exchange protocols
MR Mishra, J Kar - International Journal of Pure and Applied …, 2017 - researchgate.net
Securing network traffic has always been a must requirement for any network application
that employs insecure communication channel. The reason is to provide protection for the …
that employs insecure communication channel. The reason is to provide protection for the …
Cryptography with updates
Starting with the work of Bellare, Goldreich and Goldwasser [CRYPTO'94], a rich line of work
has studied the design of updatable cryptographic primitives. For example, in an updatable …
has studied the design of updatable cryptographic primitives. For example, in an updatable …
Evaluating web pkis
Certificate authorities serve as trusted parties to help secure web communications. They are
a vital component for ensuring the security of cloud infrastructures and big data repositories …
a vital component for ensuring the security of cloud infrastructures and big data repositories …