Safeguarding a formalized blockchain-enabled identity-authentication protocol by applying security risk-oriented patterns

A Norta, R Matulevičius, B Leiding - Computers & Security, 2019 - Elsevier
Designing government independent and secure identification-and authentication protocols
is a challenging task. Design flaws and missing specifications as well as security-and …

[图书][B] Recent advances in learning automata

A Rezvanian, AM Saghiri, SM Vahidipour… - 2018 - Springer
This book is written for computer engineers, scientists, and students studying/working in
reinforcement learning and artificial intelligence domains. The book collects recent …

Relating state-based and process-based concurrency through linear logic (full-version)

I Cervesato, A Scedrov - Information and Computation, 2009 - Elsevier
This paper has the purpose of reviewing some of the established relationships between
logic and concurrency, and of exploring new ones. Concurrent and distributed systems are …

A user-centric federated single sign-on system

S Suriadi, E Foo, A Jøsang - Journal of Network and Computer Applications, 2009 - Elsevier
Current identity management systems are not concerned with user privacy. Users must
assume that identity providers and service providers will ensure their privacy, which is not …

Rechained: Sybil-resistant distributed identities for the Internet of Things and mobile ad hoc networks

A Bochem, B Leiding - Sensors, 2021 - mdpi.com
Today, increasing Internet of Things devices are deployed, and the field of applications for
decentralized, self-organizing networks keeps growing. The growth also makes these …

[PDF][PDF] Modeling and Analysis of Security Protocols Using Colored Petri Nets.

Y Xu, X Xie - J. Comput., 2011 - academia.edu
Security protocols are the basis of security in networks. Therefore, it is essential to ensure
that these protocols function correctly. However, it is difficult to design security protocols that …

[PDF][PDF] Modeling and verification of cryptographic protocols using coloured petri nets and design/CPN

I Al-Azzoni, DG Down, R Khédri - 2nd International Workshop on …, 2005 - research.abo.fi
In this paper, we present a technique to model and analyse cryptographic protocols using
coloured Petri nets. A model of the protocol is constructed in a top-down manner: rst the …

Security verification of 802.11 i 4-way handshake protocol

J Liu, X Ye, J Zhang, J Li - 2008 IEEE International Conference …, 2008 - ieeexplore.ieee.org
Key management is a significant part of secure wireless communication. In IEEE 802. Hi
standard, 4-way handshake protocol is designed to exchange key materials and generate a …

Performances evaluation and Petri nets

O Diallo, JJPC Rodrigues, M Sene - Modeling and Simulation of Computer …, 2015 - Elsevier
Petri nets have become a tremendously important mathematical and graphical tool in
modeling and performance evaluation of real systems with discrete events that are …

[PDF][PDF] The M2X Economy–Concepts for Business Interactions, Transactions and Collaborations Among Autonomous Smart Devices

B Leiding - 2019 - ediss.uni-goettingen.de
Nowadays, business transactions almost exclusively focus on human-to-human
transactions. The persistent growth and expansion of the Internet of Things, the …