Security protocol verification: Symbolic and computational models

B Blanchet - International conference on principles of security and …, 2012 - Springer
Security protocol verification has been a very active research area since the 1990s. This
paper surveys various approaches in this area, considering the verification in the symbolic …

[PDF][PDF] Modelling and automatically analysing privacy properties for honest-but-curious adversaries

A Paverd, A Martin, I Brown - Tech. Rep, 2014 - ajpaverd.org
For certain communication protocols, undetectability and unlinkability of messages or
information items are desirable properties, and are used to reason about anonymity and …

Review of different classes of RFID authentication protocols

A Ibrahim, G Dalkılıc - Wireless Networks, 2019 - Springer
Radio-frequency identification (RFID) is an up-and-coming technology. The major limitations
of RFID technology are security and privacy concerns. Many methods, including encryption …

Route skyline queries: A multi-preference path planning approach

HP Kriegel, M Renz, M Schubert - 2010 IEEE 26th International …, 2010 - ieeexplore.ieee.org
In recent years, the research community introduced various methods for processing skyline
queries in multidimensional databases. The skyline operator retrieves all objects being …

An interactive prover for protocol verification in the computational model

D Baelde, S Delaune, C Jacomme… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Given the central importance of designing secure protocols, providing solid mathematical
foundations and computer-assisted methods to attest for their correctness is becoming …

Owl: Compositional verification of security protocols via an information-flow type system

J Gancher, S Gibson, P Singh… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Computationally sound protocol verification tools promise to deliver full-strength
cryptographic proofs for security protocols. Unfortunately, current tools lack either modularity …

A logic and an interactive prover for the computational post-quantum security of protocols

C Cremers, C Fontaine… - 2022 IEEE Symposium on …, 2022 - ieeexplore.ieee.org
We provide the first mechanized post-quantum sound security protocol proofs. We achieve
this by developing PQ-BC, a computational first-order logic that is sound with respect to …

Security modeling and analysis

J Bau, JC Mitchell - IEEE Security & Privacy, 2011 - ieeexplore.ieee.org
Security modeling centers on identifying system behavior, including any security defenses;
the system adversary's power; and the properties that constitute system security. Once a …

Deciding equivalence-based properties using constraint solving

V Cheval, V Cortier, S Delaune - Theoretical Computer Science, 2013 - Elsevier
Formal methods have proved their usefulness for analyzing the security of protocols. Most
existing results focus on trace properties like secrecy or authentication. There are however …

HomePad: A privacy-aware smart hub for home environments

I Zavalyshyn, NO Duarte… - 2018 IEEE/ACM …, 2018 - ieeexplore.ieee.org
The adoption of smart home devices is hindered today by the privacy concerns users have
regarding their personal data. Since these devices depend on remote service providers …