Traditional security protocols are mainly concerned with authentication and key establishment and rely on predistributed keys and properties of cryptographic operators. In contrast, new application areas are emerging that establish and rely on properties of the physical world. Examples include protocols for secure localization, distance bounding, and secure time synchronization. We present a formal model for modeling and reasoning about such physical security protocols. Our model extends standard, inductive, trace-based, symbolic approaches with a formalization of physical properties of the environment, namely communication, location, and time. In particular, communication is subject to physical constraints, for example, message transmissio...
Although the problems of physical security emerged more than 10,000 years before the problems of com...
International audienceThe rise of new technologies, and in particular Near Field Communication (NFC)...
International audienceThe rise of new technologies, and in particular Near Field Communication (NFC)...
We present a formal model for modeling and reasoning about security protocols. Our model extends sta...
Abstract. Traditional security protocols are mainly concerned with key establishment and principal a...
International audienceFor many modern applications like e.g. contactless payment, and keyless system...
Abstract—Many security protocols rely on the assumptions on the physical properties in which its pro...
For many modern applications like e.g., contactless payment, and keyless systems, ensuring physical ...
The increasing heterogeneity of communicating devices, ranging from resource constrained battery dri...
The increasing heterogeneity of communicating devices, ranging from resource constrained battery dri...
The increasing heterogeneity of communicating devices, ranging from resource constrained battery dri...
Distance-bounding protocols are cryptographic protocols that securely establish an upper bound on t...
The increasing heterogeneity of communicating devices, ranging from resource constrained battery dri...
Many security protocols rely on the assumptions on the physical properties in which its protocol ses...
Although the problems of physical security emerged more than 10,000 years before the problems of com...
Although the problems of physical security emerged more than 10,000 years before the problems of com...
International audienceThe rise of new technologies, and in particular Near Field Communication (NFC)...
International audienceThe rise of new technologies, and in particular Near Field Communication (NFC)...
We present a formal model for modeling and reasoning about security protocols. Our model extends sta...
Abstract. Traditional security protocols are mainly concerned with key establishment and principal a...
International audienceFor many modern applications like e.g. contactless payment, and keyless system...
Abstract—Many security protocols rely on the assumptions on the physical properties in which its pro...
For many modern applications like e.g., contactless payment, and keyless systems, ensuring physical ...
The increasing heterogeneity of communicating devices, ranging from resource constrained battery dri...
The increasing heterogeneity of communicating devices, ranging from resource constrained battery dri...
The increasing heterogeneity of communicating devices, ranging from resource constrained battery dri...
Distance-bounding protocols are cryptographic protocols that securely establish an upper bound on t...
The increasing heterogeneity of communicating devices, ranging from resource constrained battery dri...
Many security protocols rely on the assumptions on the physical properties in which its protocol ses...
Although the problems of physical security emerged more than 10,000 years before the problems of com...
Although the problems of physical security emerged more than 10,000 years before the problems of com...
International audienceThe rise of new technologies, and in particular Near Field Communication (NFC)...
International audienceThe rise of new technologies, and in particular Near Field Communication (NFC)...