Author:
Debant Alexandre,Delaune Stéphanie,Wiedling Cyrille
Publisher
Springer International Publishing
Reference30 articles.
1. Abadi, M., Fournet, C.: Mobile values, new names, and secure communication. In: Proceedings of the 28th Symposium on Principles of Programming Languages (POPL’01), pp. 104–115. ACM Press (2001)
2. Avoine, G., Bingöl, M.A., Kardas, S., Lauradoux, C., Martin, B.: A framework for analyzing RFID distance bounding protocols. J. Comput. Secur. 19(2), 289–317 (2011)
3. Avoine, G., et al.: A terrorist-fraud resistant and extractor-free anonymous distance-bounding protocol. In: Proceedings of the 12th ACM Asia Conference on Computer and Communications Security. ACM Press (2017)
4. Basin, D., Capkun, S., Schaller, P., Schmidt, B.: Formal reasoning about physical properties of security protocols. ACM Trans. Inf. Syst. Secur. (TISSEC) 14(2), 16 (2011)
5. Blanchet, B.: An efficient cryptographic protocol verifier based on prolog rules. In: Proceedings of the 14th Computer Security Foundations Workshop (CSFW’01), pp. 82–96. IEEE Computer Society Press (2001)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. So Near and Yet So Far – Symbolic Verification of Distance-Bounding Protocols;ACM Transactions on Privacy and Security;2022-05-31
2. Practical EMV Relay Protection;2022 IEEE Symposium on Security and Privacy (SP);2022-05
3. Mechanised Models and Proofs for Distance-Bounding;2021 IEEE 34th Computer Security Foundations Symposium (CSF);2021-06
4. Symbolic Analysis of Terrorist Fraud Resistance;Lecture Notes in Computer Science;2019