SoK: Computer-aided cryptography

M Barbosa, G Barthe, K Bhargavan… - … IEEE symposium on …, 2021 - ieeexplore.ieee.org
Computer-aided cryptography is an active area of research that develops and applies
formal, machine-checkable approaches to the design, analysis, and implementation of …

A systematic literature review of authentication in Internet of Things for heterogeneous devices

S Kavianpour, B Shanmugam, S Azam… - Journal of Computer …, 2019 - Wiley Online Library
Internet of Things (IoT) has become one of the most significant technologies in recent years
because of possessing the diverse application domains. The variety of applications results …

Metitarski: Past and future

LC Paulson - International Conference on Interactive Theorem …, 2012 - Springer
A brief overview is presented of MetiTarski 4, an automatic theorem prover for real-valued
special functions: ln, \exp, sin, cos, etc. MetiTarski operates through a unique interaction …

Principles of remote attestation

G Coker, J Guttman, P Loscocco, A Herzog… - International Journal of …, 2011 - Springer
Remote attestation is the activity of making a claim about properties of a target by supplying
evidence to an appraiser over a network. We identify five central principles to guide …

[图书][B] Security properties

C Cremers, S Mauw, C Cremers, S Mauw - 2012 - Springer
Security Properties | SpringerLink Skip to main content Advertisement SpringerLink Account
Menu Find a journal Publish with us Track your research Search Cart Book cover …

AAoT: Lightweight attestation and authentication of low-resource things in IoT and CPS

W Feng, Y Qin, S Zhao, D Feng - Computer Networks, 2018 - Elsevier
With the rise of Internet of Things (IoT) and Cyber-Physical Systems (CPS), the need for
smart embedded devices is rapidly increasing, and so does the security and privacy risk …

Automated verification of remote electronic voting protocols in the applied pi-calculus

M Backes, C Hritcu, M Maffei - 2008 21st IEEE Computer …, 2008 - ieeexplore.ieee.org
We present a general technique for modeling remote electronic voting protocols in the
applied pi-calculus and for automatically verifying their security. In the first part of this paper …

PUF-based mutual authentication and session key establishment protocol for IoT devices

F Zerrouki, S Ouchani, H Bouarfa - Journal of Ambient Intelligence and …, 2023 - Springer
Abstract The Internet of things (IoT) is an indispensable part of our daily lives, bringing us
many conveniences, including e-commerce and m-commerce services. Unfortunately, IoT …

Verifpal: Cryptographic protocol analysis for the real world

N Kobeissi, G Nicolas, M Tiwari - … on Cryptology in India, Bangalore, India …, 2020 - Springer
Verifpal is a new automated modeling framework and verifier for cryptographic protocols,
optimized with heuristics for common-case protocol specifications, that aims to work better …

Seems legit: Automated analysis of subtle attacks on protocols that use signatures

D Jackson, C Cremers, K Cohn-Gordon… - Proceedings of the 2019 …, 2019 - dl.acm.org
The standard definition of security for digital signatures-existential unforgeability-does not
ensure certain properties that protocol designers might expect. For example, in many …