Biometric cryptosystems: a comprehensive survey

P Kaur, N Kumar, M Singh - Multimedia Tools and Applications, 2023 - Springer
Biometric Cryptosystem (BCS) combines characteristics of both the fields: biometric and
cryptosystem, where biometric provides authentication and cryptosystem imparts security …

[HTML][HTML] A survey of symbolic methods for establishing equivalence-based properties in cryptographic protocols

S Delaune, L Hirschi - Journal of Logical and Algebraic Methods in …, 2017 - Elsevier
Cryptographic protocols aim at securing communications over insecure networks such as
the Internet, where dishonest users may listen to communications and interfere with them. A …

Towards the automated verification of cyber-physical security protocols: Bounding the number of timed intruders

V Nigam, C Talcott, A Aires Urquiza - … 26-30, 2016, Proceedings, Part II 21, 2016 - Springer
Abstract Timed Intruder Models have been proposed for the verification of Cyber-Physical
Security Protocols (CPSP) amending the traditional Dolev-Yao intruder to obey the physical …

Present runs fast: Efficient and secure implementation in software

TBS Reis, DF Aranha, J López - … , Taipei, Taiwan, September 25-28, 2017 …, 2017 - Springer
The PRESENT block cipher was one of the first hardware-oriented proposals for
implementation in extremely resource-constrained environments. Its design is based on 4-bit …

A formal specification and verification framework for timed security protocols

L Li, J Sun, Y Liu, M Sun… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Nowadays, protocols often use time to provide better security. For instance, critical
credentials are often associated with expiry dates in system designs. However, using time …

Resource-bounded intruders in denial of service attacks

AA Urquiza, MA AlTurki, M Kanovich… - 2019 IEEE 32nd …, 2019 - ieeexplore.ieee.org
Denial of Service (DoS) attacks have been a serious security concern, as no service is, in
principle, protected against them. Although a Dolev-Yao intruder with unlimited resources …

Time, computational complexity, and probability in the analysis of distance-bounding protocols

M Kanovich, T Ban Kirigin, V Nigam… - Journal of …, 2017 - content.iospress.com
Many security protocols rely on the assumptions on the physical properties in which its
protocol sessions will be carried out. For instance, Distance Bounding Protocols take into …

Resource and timing aspects of security protocols

A Aires Urquiza, MA Alturki… - Journal of computer …, 2021 - content.iospress.com
Protocol security verification is one of the best success stories of formal methods. However,
some aspects important to protocol security, such as time and resources, are not covered by …

[PDF][PDF] Proving physical proximity using symbolic models

A Debant, S Delaune, C Wiedling - 2018 - hal.science
For many modern applications like eg contactless payment, and keyless systems, ensuring
physical proximity is a security goal of paramount importance. Formal methods have proved …

A formal security analysis of ERTMS train to trackside protocols

J de Ruiter, RJ Thomas, T Chothia - … RSSRail 2016, Paris, France, June 28 …, 2016 - Springer
This paper presents a formal analysis of the train to trackside communication protocols used
in the European Railway Traffic Management System (ERTMS) standard, and in particular …