Many security protocols rely on the assumptions on the physical properties in which its protocol sessions will be carried out. For instance, Distance Bounding Protocols take into account the round trip time of messages and the transmission velocity to infer an upper bound of the distance between two agents. We classify such security protocols as Cyber-Physical. Time plays a key role in design and analysis of many of these protocols. This paper investigates the foundational differences and the impacts on the analysis when using models with discrete time and models with dense time. We show that there are attacks that can be found by models using dense time, but not when using discrete time. We illustrate this with an attack that can be carrie...
Contactless technologies are gaining more popularity everyday. Credit cards enabled with contactless...
Distance-bounding protocols form a family of challenge-response authentication protocols that have b...
Distance bounding protocols become important since wireless technologies become more and more common...
Abstract—Many security protocols rely on the assumptions on the physical properties in which its pro...
Distance-bounding protocols serve to thwart various types of proximity-based attacks, such as relay ...
peer reviewedDistance-bounding protocols serve to thwart various types of proximity-based attacks, s...
peer reviewedDistance-bounding protocols serve to thwart various types of proximity-based attacks, s...
Distance-bounding protocols serve to thwart various types of proximity-based attacks, such as relay ...
Distance-bounding protocols serve to thwart various types of proximity-based attacks, such as relay ...
Distance-bounding protocols are cryptographic protocols that securely establish an upper bound on t...
Catherine Meadows has played an important role in the advancement of formal methods for protocol sec...
Traditional security protocols are mainly concerned with authentication and key establishment and re...
Distance-bounding protocols prevent man-in-the-middle attacks by measuring response times. Recently,...
Using a distance bounding protocol, a device (the verifier) can securely obtain an upper bound on it...
Contactless technologies are gaining more popularity everyday. Credit cards enabled with contactless...
Contactless technologies are gaining more popularity everyday. Credit cards enabled with contactless...
Distance-bounding protocols form a family of challenge-response authentication protocols that have b...
Distance bounding protocols become important since wireless technologies become more and more common...
Abstract—Many security protocols rely on the assumptions on the physical properties in which its pro...
Distance-bounding protocols serve to thwart various types of proximity-based attacks, such as relay ...
peer reviewedDistance-bounding protocols serve to thwart various types of proximity-based attacks, s...
peer reviewedDistance-bounding protocols serve to thwart various types of proximity-based attacks, s...
Distance-bounding protocols serve to thwart various types of proximity-based attacks, such as relay ...
Distance-bounding protocols serve to thwart various types of proximity-based attacks, such as relay ...
Distance-bounding protocols are cryptographic protocols that securely establish an upper bound on t...
Catherine Meadows has played an important role in the advancement of formal methods for protocol sec...
Traditional security protocols are mainly concerned with authentication and key establishment and re...
Distance-bounding protocols prevent man-in-the-middle attacks by measuring response times. Recently,...
Using a distance bounding protocol, a device (the verifier) can securely obtain an upper bound on it...
Contactless technologies are gaining more popularity everyday. Credit cards enabled with contactless...
Contactless technologies are gaining more popularity everyday. Credit cards enabled with contactless...
Distance-bounding protocols form a family of challenge-response authentication protocols that have b...
Distance bounding protocols become important since wireless technologies become more and more common...