For many modern applications like e.g., contactless payment, and keyless systems, ensuring physical proximity is a security goal of paramount importance. Formal methods have proved their usefulness when analysing standard security protocols. However, existing results and tools do not apply to e.g., distance bounding protocols that aims to ensure physical proximity between two entities. This is due in particular to the fact that existing models do not represent in a faithful way the locations of the participants, and the fact that transmission of messages takes time. In this paper, we propose several reduction results: when looking for an attack, it is actually sufficient to consider a simple scenario involving at most four participants loca...
Abstract. Traditional security protocols are mainly concerned with key establishment and principal a...
peer reviewedDistance-bounding protocols serve to thwart various types of proximity-based attacks, s...
peer reviewedDistance-bounding protocols serve to thwart various types of proximity-based attacks, s...
International audienceFor many modern applications like e.g. contactless payment, and keyless system...
International audienceThe rise of new technologies, and in particular Near Field Communication (NFC)...
International audienceThe rise of new technologies, and in particular Near Field Communication (NFC)...
Contactless technologies are gaining more popularity everyday. Credit cards enabled with contactless...
Contactless technologies are gaining more popularity everyday. Credit cards enabled with contactless...
International audienceThe rise of new technologies, and in particular Near Field Communication (NFC)...
International audienceThe rise of new technologies, and in particular Near Field Communication (NFC)...
Traditional security protocols are mainly concerned with authentication and key establishment and re...
Distance-bounding protocols are cryptographic protocols that securely establish an upper bound on t...
We present a formal model for modeling and reasoning about security protocols. Our model extends sta...
Distance-bounding protocols allow a verifier to both authenticate a prover and evaluate whether the ...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
Abstract. Traditional security protocols are mainly concerned with key establishment and principal a...
peer reviewedDistance-bounding protocols serve to thwart various types of proximity-based attacks, s...
peer reviewedDistance-bounding protocols serve to thwart various types of proximity-based attacks, s...
International audienceFor many modern applications like e.g. contactless payment, and keyless system...
International audienceThe rise of new technologies, and in particular Near Field Communication (NFC)...
International audienceThe rise of new technologies, and in particular Near Field Communication (NFC)...
Contactless technologies are gaining more popularity everyday. Credit cards enabled with contactless...
Contactless technologies are gaining more popularity everyday. Credit cards enabled with contactless...
International audienceThe rise of new technologies, and in particular Near Field Communication (NFC)...
International audienceThe rise of new technologies, and in particular Near Field Communication (NFC)...
Traditional security protocols are mainly concerned with authentication and key establishment and re...
Distance-bounding protocols are cryptographic protocols that securely establish an upper bound on t...
We present a formal model for modeling and reasoning about security protocols. Our model extends sta...
Distance-bounding protocols allow a verifier to both authenticate a prover and evaluate whether the ...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
Abstract. Traditional security protocols are mainly concerned with key establishment and principal a...
peer reviewedDistance-bounding protocols serve to thwart various types of proximity-based attacks, s...
peer reviewedDistance-bounding protocols serve to thwart various types of proximity-based attacks, s...