Outsmarting smart cards

[1]  H. Nyquist,et al.  Certain factors affecting telegraph speed , 1924, Journal of the A.I.E.E..

[2]  Ari Juels,et al.  Authenticating Pervasive Devices with Human Protocols , 2005, CRYPTO.

[3]  Flavio D. Garcia,et al.  Modeling Privacy for Off-Line RFID Systems , 2010, CARDIS.

[4]  Andrey Bogdanov,et al.  Linear Slide Attacks on the KeeLoq Block Cipher , 2007, Inscrypt.

[5]  Roger M. Needham,et al.  Using encryption for authentication in large networks of computers , 1978, CACM.

[6]  H. Feistel Cryptography and Computer Privacy , 1973 .

[7]  Jacques Patarin,et al.  Security of Random Feistel Schemes with 5 or More Rounds , 2004, CRYPTO.

[8]  Steven J. Murdoch,et al.  Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks , 2007, USENIX Security Symposium.

[9]  Yvo Desmedt,et al.  Identification Tokens - or: Solving the Chess Grandmaster Problem , 1990, CRYPTO.

[10]  Laura Brandán Briones,et al.  Theories for Model-based Testing: Real-time and Coverage , 2007 .

[11]  Hendrik Michaël van der Bijl,et al.  On changing models in model-based testing , 2011 .

[12]  Wolter Pieters,et al.  Provable anonymity , 2005, FMSE '05.

[13]  Nikolay Kavaldjiev,et al.  A run-time reconfigurable Network-on-Chip for streaming DSP applications , 2006 .

[14]  Gavin Lowe,et al.  Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR , 1996, Softw. Concepts Tools.

[15]  Martin Bravenboer,et al.  Exercises in Free Syntax. Syntax Definition, Parsing, and Assimilation of Language Conglomerates , 2003 .

[16]  Aad Mathssen,et al.  Logical Calculi for Reasoning with Binding , 2008 .

[17]  Bart Jacobs,et al.  Logical Formalisation and Analysis of the Mifare Classic Card in PVS , 2011, ITP.

[18]  A. Juels,et al.  The security implications of VeriChip cloning. , 2006, Journal of the American Medical Informatics Association : JAMIA.

[19]  Ari Juels,et al.  Defining Strong Privacy for RFID , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).

[20]  Wolfgang Kowalsky,et al.  Large Area Electronics Using Printing Methods , 2005, Proceedings of the IEEE.

[21]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[22]  Tassos Dimitriou,et al.  A Lightweight RFID Protocol to protect against Traceability and Cloning attacks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[23]  Jeroen Doumen,et al.  Searching in encrypted data , 2004 .

[24]  Thomas Bäck,et al.  Mixed-integer evolution strategies for parameter optimization and their applications to medical image analysis , 2005 .

[25]  Flavio D. Garcia,et al.  Tutorial: Proxmark, the Swiss Army Knife for RFID Security Research , 2012 .

[26]  Christof Paar,et al.  Breaking KeeLoq in a Flash: On Extracting Keys at Lightning Speed , 2009, AFRICACRYPT.

[27]  van Mf Marcel Amstel,et al.  Assessing and improving the quality of model transformations , 2012 .

[28]  Jovan Dj. Golic,et al.  Cryptanalysis of Alleged A5 Stream Cipher , 1997, EUROCRYPT.

[29]  Jan Tretmans,et al.  Model Based Testing with Labelled Transition Systems , 2008, Formal Methods and Testing.

[30]  Flavio D. Garcia,et al.  Towards a Practical Solution to the RFID Desynchronization Problem , 2010, RFIDSec.

[31]  Ingrid Verbauwhede,et al.  Power Analysis of Atmel CryptoMemory - Recovering Keys from Secure EEPROMs , 2012, CT-RSA.

[32]  Basel Alomair,et al.  Scalable RFID Systems: A Privacy-Preserving Protocol with Constant-Time Identification , 2010, IEEE Transactions on Parallel and Distributed Systems.

[33]  Arthur I. Baars,et al.  Embedded Compilers , 2009 .

[34]  Mohammad Ali Abam New data structures and algorithms for mobile data , 2007 .

[35]  Ljp Luc Engelen From napkin sketches to reliable software , 2012 .

[36]  M Muhammad Atif,et al.  Formal modeling and verification of distributed failure detectors , 2011 .

[37]  Adriaan Middelkoop,et al.  Inference of Program Properties with Attribute Grammars, Revisited , 2012 .

[38]  Nicolas Courtois,et al.  The Dark Side of Security by Obscurity - and Cloning MiFare Classic Rail and Building Passes, Anywhere, Anytime , 2009, SECRYPT.

[39]  Joeri de Ruiter,et al.  The SmartLogic Tool: Analysing and Testing Smart Card Protocols , 2012, 2012 IEEE Fifth International Conference on Software Testing, Verification and Validation.

[40]  Muhammad Torabi Dashti,et al.  A Privacy-Friendly RFID Protocol Using Reusable Anonymous Tickets , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.

[41]  Pascal Durr,et al.  Resource-based Verification for Robust Composition of Aspects , 2008 .

[42]  Melanie R. Rieback,et al.  Security and Privacy of Radio Frequency Identification , 2008 .

[43]  Mari Antonius Cornelis Dekker,et al.  Flexible Access Control for Dynamic Collaborative Environments , 2009 .

[44]  Karsten Nohl,et al.  Peeling Away Layers of an RFID Security System , 2011, Financial Cryptography.

[45]  Juan E. Tapiador,et al.  RFID Systems: A Survey on Security Threats and Proposed Solutions , 2006, PWC.

[46]  Joeri de Ruiter,et al.  Designed to Fail: A USB-Connected Reader for Online Banking , 2012, NordSec.

[47]  Martín Abadi,et al.  Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption) , 2007, Journal of Cryptology.

[48]  Magiel Bruntink,et al.  Renovation of idiomatic crosscutting concerns in embedded systems , 2005 .

[49]  M. T. de Berg,et al.  Multi-functional geometric data structures , 2003 .

[50]  M. D. Berg,et al.  Optimal Geometric Data Structures , 2007 .

[51]  Anton Wijs,et al.  Silent steps in transition systems and Markov chains , 2007 .

[52]  Werner Heijstek,et al.  Architecture design in global and model-centric software development , 2012 .

[53]  Gildas Avoine,et al.  The Swiss-Knife RFID Distance Bounding Protocol , 2008, ICISC.

[54]  Sander Vermolen,et al.  Software Language Evolution , 2008, 2008 15th Working Conference on Reverse Engineering.

[55]  John Gilmore,et al.  Cracking DES - secrets of encryption research, wiretap politics and chip design: how federal agencies subvert privacy , 1998 .

[56]  Kris Myny,et al.  Comparison of organic diode structures regarding high-frequency rectification behavior in radio-frequency identification tags , 2006 .

[57]  Flavio D. Garcia,et al.  Exposing iClass Key Diversification , 2011, WOOT.

[58]  Eu-Jin Goh,et al.  Searching on Encrypted Data , 2003 .

[59]  Mohammad Mahdi Jaghoori,et al.  Time At Your Service: Schedulability Analysis of Real-Time and Distributed Services , 2010 .

[60]  B. J. Arnoldus,et al.  An illumination of the template enigma : software code generation with templates , 2011 .

[61]  M. Attaran RFID: an enabler of supply chain operations , 2007 .

[62]  Omar Choudary The smart card detective: a hand-held EMV interceptor , 2012 .

[63]  A Adam Koprowski,et al.  Termination of rewriting and its certification , 2004 .

[64]  Ronald L. Rivest,et al.  Still Guarding Secrets after Years of Attacks , RSA Earns Accolades for its Founders , 2003 .

[65]  Bogdan Warinschi,et al.  Soundness of Formal Encryption in the Presence of Active Adversaries , 2004, TCC.

[66]  Christof Paar,et al.  Don't Trust Satellite Phones: A Security Analysis of Two Satphone Standards , 2012, 2012 IEEE Symposium on Security and Privacy.

[67]  B. Lijnse,et al.  TOP to the rescue. Task-oriented programming for incident response applications , 2005 .

[68]  Jens R. Calamé,et al.  Testing reactive systems with data: enumerative methods and constraint solving , 2008 .

[69]  Gerhard Fettweis,et al.  A new network processor architecture for high-speed communications , 1999, 1999 IEEE Workshop on Signal Processing Systems. SiPS 99. Design and Implementation (Cat. No.99TH8461).

[70]  Scw Bas Ploeger,et al.  Improved verification methods for concurrent systems , 2009 .

[71]  Jacques Patarin,et al.  New Results on Pseudorandom Permutation Generators Based on the DES Scheme , 1991, CRYPTO.

[72]  J. Kwisthout,et al.  The Computational Complexity of Probabilistic Networks , 2009 .

[73]  Marcin Czenko,et al.  TuLiP : reshaping trust management , 2009 .

[74]  Roy Want,et al.  An introduction to RFID technology , 2006, IEEE Pervasive Computing.

[75]  Moni Naor,et al.  On the Construction of Pseudorandom Permutations: Luby—Rackoff Revisited , 1996, Journal of Cryptology.

[76]  Yanjing Wang,et al.  Epistemic Modelling and Protocol Dynamics , 2010 .

[77]  Jacques Patarin,et al.  About Feistel Schemes with Six (or More) Rounds , 1998, FSE.

[78]  Iris Loeb Natural Deduction, Sharing By Presentation , 2007 .

[79]  Z Zvezdan Protic,et al.  Configuration management for models : generic methods for model comparison and model co-evolution , 2011 .

[80]  Flavio D. Garcia,et al.  Dismantling iClass and iClass Elite , 2012, ESORICS.

[81]  Ncwm Niels Braspenning Model-based integration and testing of high-tech multi-disciplinary systems , 2008 .

[82]  Kab Kevin Verbeek Algorithms for cartographic visualization , 2012 .

[83]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[84]  H. Zimmermann,et al.  OSI Reference Model - The ISO Model of Architecture for Open Systems Interconnection , 1980, IEEE Transactions on Communications.

[85]  de A. Bruin,et al.  Service-oriented discovery of knowledge : foundations, implementations and applications , 2010 .

[86]  T. van der Storm Component-based configuration, integration and delivery , 2003 .

[87]  Karina R. Olmos Joffré Strategies for Context Sensitive Program Transformation , 2009 .

[88]  Ivan S. Zapreev Model checking Markov chains : techniques and tools , 2008 .

[89]  Seyyed Hamed Hashemi,et al.  Studies on verification of wireless sensor networks and abstraction learning for system inference , 2008 .

[90]  Tom Staijen,et al.  Graph-based Specification and Verification for Aspect-Oriented Languages , 2010 .

[91]  Lennart C. L. Kats,et al.  Building Blocks for Language Workbenches , 2011 .

[92]  M. G. van der Horst,et al.  Scalable block processing algorithms , 2008 .

[93]  K. Tsirogiannis,et al.  Analysis of flow and visibility on triangulated terrains , 2011 .

[94]  RH Rudolf Mak,et al.  Design and performance analysis of data-independent stream processing systems , 2008 .

[95]  Wolfgang Rankl,et al.  Smart Card Handbook , 1997 .

[96]  Serge Vaudenay,et al.  On Privacy Models for RFID , 2007, ASIACRYPT.

[97]  Taolue Chen Clocks, Dice and Processes , 2009 .

[98]  S. Georgievska Probability and Hiding in Concurrent Processes ( thesis abstract ) , 2011 .

[99]  Hovav Shacham,et al.  Comprehensive Experimental Analyses of Automotive Attack Surfaces , 2011, USENIX Security Symposium.

[100]  Martijn van Veelen,et al.  Considerations on modeling for early detection of abnormalities in locally autonomous distributed systems , 2007 .

[101]  Ichiro Hasuo,et al.  Tracing Anonymity with Coalgebras , 2008 .

[102]  Bart Jacobs,et al.  Dismantling MIFARE Classic , 2008, ESORICS.

[103]  Ronald L. Rivest,et al.  Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.

[104]  Gildas Avoine,et al.  A privacy-restoring mechanism for offline RFID systems , 2012, WISEC '12.

[105]  Farhad Arbab,et al.  Model Checking of Component Connectors , 2007, 31st Annual International Computer Software and Applications Conference (COMPSAC 2007).

[106]  Georgeta Igna,et al.  Performance analysis of real-time task systems using timed automata , 2013 .

[107]  Gerhard de Koning Gans Analysis of the MIFARE Classic used in the OV-Chipkaart project , 2008 .

[108]  W. Kuijper Compositional Synthesis of Safety Controllers , 2012 .

[109]  Li Liu,et al.  RFID Application in Hospitals: A Case Study on a Demonstration RFID Project in a Taiwan Hospital , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).

[110]  Flavio D. Garcia,et al.  A Practical Attack on the MIFARE Classic , 2008, CARDIS.

[111]  J. K. Berendsen,et al.  Abstraction, prices and probability in model checking timed automata , 2010 .

[112]  Flaminia L. Luccio,et al.  Secure Recharge of Disposable RFID Tickets , 2011, Formal Aspects in Security and Trust.

[113]  Shai Halevi,et al.  Tree-based HB protocols for privacy-preserving authentication of RFID tags , 2011, J. Comput. Secur..

[114]  Hsiao-Cheng Yu,et al.  Challenges to Global RFID Adoption , 2006, 2006 Technology Management for the Global Future - PICMET 2006 Conference.

[115]  Andrew S. Tanenbaum,et al.  RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management , 2005, ACISP.

[116]  Lei Hu,et al.  Cube Cryptanalysis of Hitag2 Stream Cipher , 2011, CANS.

[117]  D. Costa Formal models for component connectors , 2010 .

[118]  Saeed Sedghi,et al.  Towards Provably Secure Efficiently Searchable Encryption , 2012 .

[119]  Eric R. Verheul,et al.  Best Effort and Practice Activation Codes , 2011, TrustBus.

[120]  Bruno Blanchet,et al.  An efficient cryptographic protocol verifier based on prolog rules , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..

[121]  Samy Bengio,et al.  Special Uses and Abuses of the Fiat-Shamir Passport Protocol , 1987, CRYPTO.

[122]  Martin R. Neuhäußer,et al.  Model checking nondeterministic and randomly timed systems , 2010 .

[123]  Erik Tews,et al.  Attacks on the DECT Authentication Mechanisms , 2009, CT-RSA.

[124]  Christian Krause,et al.  Reconfigurable Component Connectors , 2011 .

[125]  Koutarou Suzuki,et al.  Cryptographic Approach to “Privacy-Friendly” Tags , 2003 .

[126]  Vivek Subramanian,et al.  Progress Toward Development of All-Printed RFID Tags: Materials, Processes, and Devices , 2005, Proceedings of the IEEE.

[127]  Robert Brijder,et al.  Models of natural computation : gene assembly and membrane systems , 2008 .

[128]  U Uzma Khadim,et al.  Process algebras for hybrid systems : comparison and development , 2008 .

[129]  van Pja Paul Tilburg From computability to executability : a process-theoretic view on automata theory , 2011 .

[130]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[131]  David Evans,et al.  Reverse-Engineering a Cryptographic RFID Tag , 2008, USENIX Security Symposium.

[132]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[133]  Fpm Frank Stappers Bridging formal models : an engineering perspective , 2012 .

[134]  Gürcan Gülesir,et al.  Evolvable Behavior Specifications Using Context-Sensitive Wildcards , 2008 .

[135]  Flavio D. Garcia,et al.  Security Flaw in MIFARE Classic , 2008 .

[136]  R.S.S. O'Connor,et al.  Incompleteness & completeness : formalizing logic and analysis in type theory , 2005 .

[137]  Roel Verdult,et al.  Practical Attacks on NFC Enabled Cell Phones , 2011, 2011 Third International Workshop on Near Field Communication.

[138]  C. J. Boogerd,et al.  Focusing Automatic Code Inspections , 2010 .

[139]  Aah Ammar Osaiweran Formal development of control software in the medical systems domain , 2012 .

[140]  M. Torabi Dashti,et al.  Keeping Fairness Alive : Design and formal verification of optimistic fair exchange protocols , 2008 .

[141]  Hugo Jonker,et al.  Security matters : privacy in voting and fairness in digital exchange , 2009 .

[142]  Flavio D. Garcia,et al.  Wirelessly Pickpocketing a Mifare Classic Card , 2009, 2009 30th IEEE Symposium on Security and Privacy.

[143]  Philippe Oechslin,et al.  A scalable and provably secure hash-based RFID protocol , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.

[144]  Helmut Knebl,et al.  Introduction to Cryptography , 2002, Information Security and Cryptography.

[145]  Flavio D. Garcia,et al.  A Toolbox for RFID Protocol Analysis , 2012 .

[146]  Jayanti Venkataraman,et al.  Printing Radio Frequency Identification (RFID) Tag Antennas Using Inks Containing Silver Dispersions , 2005 .

[147]  Sebastiaan Gijsbert Marinus Cornelissen,et al.  Evaluating Dynamic Analysis Techniques for Program Comprehension , 2009 .

[148]  Juan E. Tapiador,et al.  EMAP: An Efficient Mutual-Authentication Protocol for Low-Cost RFID Tags , 2006, OTM Workshops.

[149]  Claude Castelluccia,et al.  Extending SAT Solvers to Cryptographic Problems , 2009, SAT.

[150]  Markus G. Kuhn,et al.  An RFID Distance Bounding Protocol , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[151]  T. D. Vu,et al.  Semantics and applications of process and program algebra , 2007 .

[152]  Bas Basten,et al.  Ambiguity Detection for Programming Language Grammars , 2011 .

[153]  Hasan Sözer,et al.  Architecting Fault-Tolerant Software Systems , 2009 .

[154]  Jean-Jacques Quisquater,et al.  Practical Algebraic Attacks on the Hitag2 Stream Cipher , 2009, ISC.

[155]  Harmen Kastenberg Graph-based software specification and verification , 2008 .

[156]  Ahmad-Reza Sadeghi,et al.  Privilege Escalation Attacks on Android , 2010, ISC.

[157]  Flavio D. Garcia,et al.  Sound Computational Interpretation of Symbolic Hashes in the Standard Model , 2006, IWSEC.

[158]  Arjen van Weelden,et al.  Putting Types To Good Use , 2007 .

[159]  Gerhard P. Hancke,et al.  Design of a secure distance-bounding channel for RFID , 2011, J. Netw. Comput. Appl..

[160]  Somayeh Malakuti Khah Olun Abadi Event composition model: achieving naturalness in runtime enforcement , 2011 .

[161]  Dan S. Wallach,et al.  Analysis of an electronic voting system , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[162]  R. Boumen,et al.  Integration and test plans for complex manufacturing systems , 2007 .

[163]  Ronald Middelkoop,et al.  Capturing and exploiting abstract views of states in OO verification , 2011 .

[164]  Marius Adrian Marin,et al.  An Integrated System to Manage Crosscutting Concerns in Source Code , 2008 .

[165]  Mohammed G. Khatib MEMS-Based Storage Devices : Integration in Energy-Constrained Mobile Systems , 2009 .

[166]  Kirti Chopra,et al.  Physics Behind RFID Smart Card Security In Context Of Privacy , 2010 .

[167]  van Mj Muck Weerdenburg,et al.  Efficient rewriting techniques , 2009 .

[168]  José Proença,et al.  Synchronous Coordination of Distributed Components , 2011 .

[169]  Tingting Han,et al.  Diagnosis, Synthesis and Analysis of Probabilistic Models , 2009, Ausgezeichnete Informatikdissertationen.

[170]  Dong Hoon Lee,et al.  Cryptanalysis of INCrypt32 in HID's iCLASS Systems , 2013, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[171]  Natarajan Shankar,et al.  Formal Verification for Fault-Tolerant Architectures: Prolegomena to the Design of PVS , 1995, IEEE Trans. Software Eng..

[172]  J. Endrullis Termination and Productivity , 2010 .

[173]  Lars R. Knudsen,et al.  The Security of Feistel Ciphers with Six Rounds or Less , 2002, Journal of Cryptology.

[174]  Raluca Marin-Perianu,et al.  Wireless Sensor Networks in Motion - Clustering Algorithms for Service Discovery and Provisioning , 2008 .

[175]  Tim K. Cocx,et al.  Algorithmic tools for data-oriented law enforcement , 2009 .

[176]  Gregor von Bochmann,et al.  Formal Methods in Communication Protocol Design , 1980, IEEE Trans. Commun..

[177]  de Ism Ivo Jong Integration and test strategies for complex manufacturing machines , 2008 .

[178]  R. Bakhshi Gossiping Models : Formal Analysis of Epidemic Protocols , 2011 .

[179]  de Hayco Jong Flexible heterogeneous software systems , 2007 .

[180]  Mike Burmester,et al.  Anonymous RFID authentication supporting constant-cost key-lookup against active adversaries , 2008, Int. J. Appl. Cryptogr..

[181]  Flavio D. Garcia Formal and Computational Cryptography: Protocols, Hashes and Commitments , 2008 .

[182]  Shien-Chiang Yu,et al.  RFID implementation and benefits in libraries , 2007, Electron. Libr..

[183]  Werner Schindler,et al.  Random Number Generators for Cryptographic Applications , 2009, Cryptographic Engineering.

[184]  Martin E. Hellman,et al.  A cryptanalytic time-memory trade-off , 1980, IEEE Trans. Inf. Theory.

[185]  A. Morali,et al.  IT architecture-based confidentiality risk assessment in networks of organizations , 2011 .

[186]  Lejla Batina,et al.  Using NFC Phones for Proving Credentials , 2012, MMB/DFT.

[187]  Stephanie Kemper,et al.  Modelling and analysis of real-time coordination patterns , 2011 .

[188]  Mike Bond,et al.  2010 IEEE Symposium on Security and Privacy Chip and PIN is Broken , 2022 .

[189]  Bin Zhang,et al.  Cryptanalysis of the Atmel Cipher in SecureMemory, CryptoMemory and CryptoRF , 2011, ACNS.

[190]  D. Graaf,et al.  Mining semi-structured data, theoretical and experimental aspects of pattern evaluation , 2008 .

[191]  Ileana Buhan,et al.  Cryptographic keys from noisy data, theory and applications , 2008 .

[192]  E Elena Mumford,et al.  Drawing graphs for cartographic applications , 2008 .

[193]  M. T. de Berg,et al.  Algorithms for Fat Objects: Decompositions and Applications , 2004 .

[194]  Iwen Coisel Data Synchronization in Privacy-Preserving RFID Authentication Schemes , 2008 .

[195]  Flavio D. Garcia,et al.  Sound Computational Interpretation of Formal Hashes , 2006, IACR Cryptol. ePrint Arch..

[196]  Lacramioara Astefanoaei,et al.  An executable theory of multi-agent systems refinement , 2011 .

[197]  van Mpwj Michiel Osch Automated model-based testing of hybrid systems , 2009 .

[198]  Martín Abadi,et al.  A calculus for cryptographic protocols: the spi calculus , 1997, CCS '97.

[199]  Matthew J. B. Robshaw,et al.  PRINTcipher: A Block Cipher for IC-Printing , 2010, CHES.

[200]  Tim K. Cocx,et al.  Metrics and visualisation for crime analysis and genomics , 2005 .

[201]  Ari Juels,et al.  RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.

[202]  Bastiaan Stephan Graaf,et al.  Model-Driven Evolution of Software Architectures , 2007, 11th European Conference on Software Maintenance and Reengineering (CSMR'07).

[203]  Miguel E. Andrés,et al.  Quantitative Analysis of Information Leakage in Probabilistic and Nondeterministic Systems , 2011, ArXiv.

[204]  A. L. de Groot,et al.  Practical Automaton proofs in PVS , 2000 .

[205]  Michael Luby,et al.  Pseudorandomness and cryptographic applications , 1996, Princeton computer science notes.

[206]  Gildas Avoine,et al.  Privacy-friendly synchronized ultralightweight authentication protocols in the storm , 2012, J. Netw. Comput. Appl..

[207]  Flavio D. Garcia,et al.  Gone in 360 Seconds: Hijacking with Hitag2 , 2012, USENIX Security Symposium.

[208]  Ronald L. Rivest,et al.  The blocker tag: selective blocking of RFID tags for consumer privacy , 2003, CCS '03.

[209]  Jasen Markovski,et al.  Real and stochastic time in process algebras for performance evaluation , 2008 .

[210]  Flavio D. Garcia,et al.  Sound and complete computational interpretation of symbolic hashes in the standard model , 2006, Theor. Comput. Sci..

[211]  Flavio D. Garcia Proof of concept , cloning the OV-Chip card Public transport system in The Netherlands , 2008 .

[212]  Ali Mesbah,et al.  Analysis and Testing of Ajax-based Single-page Web Applications , 2009 .

[213]  M. J. de Mol,et al.  Reasoning about functional programs : Sparkle, a proof assistant for Clean , 2009 .

[214]  Carl Eklund,et al.  National Institute for Standards and Technology , 2009, Encyclopedia of Biometrics.

[215]  Wolter Pieters,et al.  La volonté machinale: understanding the electronic voting controversy , 2008 .

[216]  Eduardo Zambon,et al.  Abstract Graph Transformation - Theory and Practice , 2013 .

[217]  Frederik Vercauteren,et al.  On the Claimed Privacy of EC-RAC III , 2010, RFIDSec.

[218]  Yossi Sheffi,et al.  RFID AND THE INNOVATION CYCLE , 2004 .

[219]  H. Nyquist,et al.  Certain Topics in Telegraph Transmission Theory , 1928, Transactions of the American Institute of Electrical Engineers.

[220]  Flavio D. Garcia,et al.  Dismantling SecureMemory, CryptoMemory and CryptoRF , 2010, CCS '10.

[221]  Dmitri Jarnikov,et al.  QoS framework for video streaming in home networks , 2007 .

[222]  Martin Novotný,et al.  Breaking Hitag2 with Reconfigurable Hardware , 2011, 2011 14th Euromicro Conference on Digital System Design.

[223]  Olivier Billet,et al.  An efficient forward private RFID protocol , 2009, CCS.

[224]  Trajce Dimkov,et al.  Alignment of organizational security policies: Theory and Practice , 2012 .

[225]  D. E. Nadales Agut,et al.  A Compositional Interchange Format for Hybrid Systems: Design and Implementation , 2012 .

[226]  Amir Rahmati,et al.  TARDIS: Time and Remanence Decay in SRAM to Implement Secure Protocols on Embedded Devices without Clocks , 2012, USENIX Security Symposium.

[227]  Yi Mu,et al.  New Privacy Results on Synchronized RFID Authentication Protocols against Tag Tracing , 2009, ESORICS.

[228]  David A. Wagner,et al.  Privacy and security in library RFID: issues, practices, and architectures , 2004, CCS '04.

[229]  Milosch Meriac Heart of Darkness-exploring the uncharted backwaters of HID iCLASS , 2010 .

[230]  Juan E. Tapiador,et al.  Cryptanalysis of the David-Prasad RFID Ultralightweight Authentication Protocol , 2010, RFIDSec.

[231]  Hossein Rahmani,et al.  Analysis of protein-protein interaction networks by means of annotated graph mining algorithms , 2012 .

[232]  Vincent Rijmen,et al.  The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .

[233]  Philippe Oechslin,et al.  Making a Faster Cryptanalytic Time-Memory Trade-Off , 2003, CRYPTO.

[234]  Herbert Bos,et al.  Howard: A Dynamic Excavator for Reverse Engineering Data Structures , 2011, NDSS.

[235]  EM Elena Bortnik,et al.  Formal methods in support of SMC design , 2008 .

[236]  Flavio D. Garcia,et al.  Computational Soundness of Non-Malleable Commitments , 2008, ISPEC.

[237]  Anton Wijs,et al.  What to do next? Analysing and optimising system behaviour in time , 2007 .

[238]  Bart Jacobs,et al.  Crossing Borders: Security and Privacy Issues of the European e-Passport , 2006, IWSEC.

[239]  Damiano Bolzoni,et al.  Revisiting Anomaly-based Network Intrusion Detection Systems , 2009 .

[240]  Marcel Verhoef,et al.  Modeling and validating distributed embedded real-time control systems , 2009 .

[241]  Young-Joo Moon,et al.  Stochastic models for quality of service of component connectors , 2011 .

[242]  Gene Tsudik,et al.  YA-TRAP: yet another trivial RFID authentication protocol , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06).

[243]  J. van den Berg,et al.  Reasoning about Java programs in PVS using JML , 2009 .

[244]  A. Rodriguez Yakushev,et al.  Towards Getting Generic Programming Ready for Prime Time , 2009 .

[245]  Oscar H. Ibarra,et al.  On spiking neural P systems , 2006, Natural Computing.

[246]  Cfj Christian Lange,et al.  Assessing and improving the quality of modeling : a series of empirical studies about the UML , 2007 .