Formal Verification of a Key Establishment Protocol for EPC Gen2 RFID Systems: Work in Progress
暂无分享,去创建一个
[1] Mathieu Turuani,et al. The CL-Atse Protocol Analyser , 2006, RTA.
[2] Tieyan Li,et al. Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols , 2007, SEC.
[3] Bruce Schneier,et al. Applied cryptography : protocols, algorithms, and source codein C , 1996 .
[4] Alessandro Armando,et al. SATMC: a SAT-based model checker for security protocols, business processes, and security APIs , 2004, International Journal on Software Tools for Technology Transfer.
[5] Yannick Chevalier,et al. A High Level Protocol Specification Language for Industrial Security-Sensitive Protocols , 2004 .
[6] Michel Barbeau,et al. Security Threats on EPC Based RFID Systems , 2008, Fifth International Conference on Information Technology: New Generations (itng 2008).
[7] Joaquín García,et al. A Practical Implementation Attack on Weak Pseudorandom Number Generator Designs for EPC Gen2 Tags , 2011, Wirel. Pers. Commun..
[8] Ari Juels,et al. RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.
[9] Robert H. Deng,et al. Vulnerability Analysis of EMAP-An Efficient RFID Mutual Authentication Protocol , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).
[10] Elisa Bertino,et al. Security Analysis of the SASI Protocol , 2009, IEEE Transactions on Dependable and Secure Computing.
[11] Frédéric Thiesse,et al. Extending the EPC network: the potential of RFID in anti-counterfeiting , 2005, SAC '05.
[12] Sebastian Mödersheim,et al. The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications , 2005, CAV.
[13] Michel Barbeau,et al. Secure Localization of Nodes in Wireless Sensor Networks with Limited Number of Truth Tellers , 2009, 2009 Seventh Annual Communication Networks and Services Research Conference.
[14] Bruce Schneier,et al. Applied cryptography (2nd ed.): protocols, algorithms, and source code in C , 1995 .
[15] Sebastian Mödersheim,et al. OFMC: A symbolic model checker for security protocols , 2005, International Journal of Information Security.
[16] Leslie Lamport,et al. The temporal logic of actions , 1994, TOPL.
[17] Nora Cuppens-Boulahia,et al. Securing the Communications of Home Health Care Systems Based on RFID Sensor Networks , 2010, 2010 8th Annual Communication Networks and Services Research Conference.
[18] Michel Barbeau,et al. Security Threat Mitigation Trends in Low-Cost RFID Systems , 2009, DPM/SETOP.
[19] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).