Security protocol verification: Symbolic and computational models
B Blanchet - International conference on principles of security and …, 2012 - Springer
Security protocol verification has been a very active research area since the 1990s. This
paper surveys various approaches in this area, considering the verification in the symbolic …
paper surveys various approaches in this area, considering the verification in the symbolic …
[PDF][PDF] Modelling and automatically analysing privacy properties for honest-but-curious adversaries
For certain communication protocols, undetectability and unlinkability of messages or
information items are desirable properties, and are used to reason about anonymity and …
information items are desirable properties, and are used to reason about anonymity and …
Review of different classes of RFID authentication protocols
A Ibrahim, G Dalkılıc - Wireless Networks, 2019 - Springer
Radio-frequency identification (RFID) is an up-and-coming technology. The major limitations
of RFID technology are security and privacy concerns. Many methods, including encryption …
of RFID technology are security and privacy concerns. Many methods, including encryption …
Route skyline queries: A multi-preference path planning approach
In recent years, the research community introduced various methods for processing skyline
queries in multidimensional databases. The skyline operator retrieves all objects being …
queries in multidimensional databases. The skyline operator retrieves all objects being …
An interactive prover for protocol verification in the computational model
Given the central importance of designing secure protocols, providing solid mathematical
foundations and computer-assisted methods to attest for their correctness is becoming …
foundations and computer-assisted methods to attest for their correctness is becoming …
Owl: Compositional verification of security protocols via an information-flow type system
J Gancher, S Gibson, P Singh… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Computationally sound protocol verification tools promise to deliver full-strength
cryptographic proofs for security protocols. Unfortunately, current tools lack either modularity …
cryptographic proofs for security protocols. Unfortunately, current tools lack either modularity …
A logic and an interactive prover for the computational post-quantum security of protocols
C Cremers, C Fontaine… - 2022 IEEE Symposium on …, 2022 - ieeexplore.ieee.org
We provide the first mechanized post-quantum sound security protocol proofs. We achieve
this by developing PQ-BC, a computational first-order logic that is sound with respect to …
this by developing PQ-BC, a computational first-order logic that is sound with respect to …
Security modeling and analysis
J Bau, JC Mitchell - IEEE Security & Privacy, 2011 - ieeexplore.ieee.org
Security modeling centers on identifying system behavior, including any security defenses;
the system adversary's power; and the properties that constitute system security. Once a …
the system adversary's power; and the properties that constitute system security. Once a …
Deciding equivalence-based properties using constraint solving
Formal methods have proved their usefulness for analyzing the security of protocols. Most
existing results focus on trace properties like secrecy or authentication. There are however …
existing results focus on trace properties like secrecy or authentication. There are however …
HomePad: A privacy-aware smart hub for home environments
I Zavalyshyn, NO Duarte… - 2018 IEEE/ACM …, 2018 - ieeexplore.ieee.org
The adoption of smart home devices is hindered today by the privacy concerns users have
regarding their personal data. Since these devices depend on remote service providers …
regarding their personal data. Since these devices depend on remote service providers …