Lightweight RFID authentication with forward and backward security

M Burmester, J Munilla - ACM Transactions on Information and System …, 2011 - dl.acm.org
We propose a lightweight RFID authentication protocol that supports forward and backward
security. The only cryptographic mechanism that this protocol uses is a pseudorandom …

Constraint solving techniques and enriching the model with equational theories

H Comon-Lundh, S Delaune… - Formal Models and …, 2011 - ebooks.iospress.nl
Derivability constraints represent in a symbolic way the infinite set of possible executions of
a finite protocol, in presence of an arbitrary active attacker. Solving a derivability constraint …

Verification and composition of security protocols with applications to electronic voting

ŞC Ciobâcǎ - 2011 - theses.hal.science
This thesis is about the formal verification and composition of security protocols, motivated
by applications to electronic voting protocols. Chapters 3 to 5 concern the verification of …

Bounded memory Dolev-Yao adversaries in collaborative systems

M Kanovich, T Ban Kirigin, V Nigam… - Formal Aspects of Security …, 2011 - Springer
This paper extends existing models for collaborative systems. We investigate how much
damage can be done by insiders alone, without collusion with an outside adversary. In …

Transforming password protocols to compose

C Chevalier, S Delaune, S Kremer - 31st Conference on …, 2011 - inria.hal.science
Formal, symbolic techniques are extremely useful for modelling and analysing security
protocols. They improved our understanding of security protocols, allowed to discover flaws …

[引用][C] 安全协议的规范化设计

邓帆, 邓少锋, 张文政 - 计算机工程与应用, 2011

[引用][C] Traduction et extension d'un langage de description des protocoles de sécurité vers une algèbre de réseaux de Petri

F Gava, S Tan, F Pommereau

[引用][C] Preuve formelle d'algorithmes parallèles pour la génération de l'espace d'état et la vérification de protocoles de sécurité