Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleMarch 2008
Mutual authentication in RFID: security and privacy
ASIACCS '08: Proceedings of the 2008 ACM symposium on Information, computer and communications securityPages 292–299https://doi.org/10.1145/1368310.1368352In RFID protocols, tags identify and authenticate themselves to readers. At Asiacrypt 2007, Vaudenay studied security and privacy models for these protocols. We extend this model to protocols which offer reader authentication to tags. Whenever ...
- short-paperMarch 2008
Mechanisms for usage control
ASIACCS '08: Proceedings of the 2008 ACM symposium on Information, computer and communications securityPages 240–244https://doi.org/10.1145/1368310.1368344Usage control is a generalization of access control that also addresses how data is used after it is released. We present a formal model for different mechanisms that can enforce usage control policies on the consumer side.
- research-articleMarch 2008
Computationally sound mechanized proofs for basic and public-key Kerberos
ASIACCS '08: Proceedings of the 2008 ACM symposium on Information, computer and communications securityPages 87–99https://doi.org/10.1145/1368310.1368326We present a computationally sound mechanized analysis of Kerberos 5, both with and without its public-key extension PKINIT. We prove authentication and key secrecy properties using the prover CryptoVerif, which works directly in the computational model;...