International audienceThe rise of new technologies, and in particular Near Field Communication (NFC) tags, offers new applications such as contactless payments, key-less entry systems, transport ticketing. .. Due to their security concerns, new security protocols, called distance-bounding protocols, have been developed to ensure physical proximity of the devices during a session. In order to prevent flaws and attacks, these protocols require formal verification. In this paper, we propose a new symbolic model allowing us to take into account the location of the agents and to model the fact that transmitting a message takes time. We propose two reduction results to render automatic verification possible relying on the existing verification to...
Authentication in conventional networks (like the Internet) is usually based upon something you know...
Abstract. Contactless technologies such as RFID, NFC, and sensor net-works are vulnerable to mafia a...
Abstract. Contactless technologies such as RFID, NFC, and sensor net-works are vulnerable to mafia a...
International audienceThe rise of new technologies, and in particular Near Field Communication (NFC)...
International audienceThe rise of new technologies, and in particular Near Field Communication (NFC)...
International audienceThe rise of new technologies, and in particular Near Field Communication (NFC)...
International audienceFor many modern applications like e.g. contactless payment, and keyless system...
For many modern applications like e.g., contactless payment, and keyless systems, ensuring physical ...
Distance-bounding protocols are cryptographic protocols that securely establish an upper bound on t...
Contactless technologies are gaining more popularity everyday. Credit cards enabled with contactless...
Contactless technologies are gaining more popularity everyday. Credit cards enabled with contactless...
Distance-bounding protocols allow a verifier to both authenticate a prover and evaluate whether the ...
Distance bounding protocols allow a verifier to both authenticate a prover and evaluate whether the ...
Distance bounding protocols allow a verifier to both authenticate a prover and evaluate whether the ...
© 2018 Association for Computing Machinery. Distance-bounding protocols allow a verifier to both aut...
Authentication in conventional networks (like the Internet) is usually based upon something you know...
Abstract. Contactless technologies such as RFID, NFC, and sensor net-works are vulnerable to mafia a...
Abstract. Contactless technologies such as RFID, NFC, and sensor net-works are vulnerable to mafia a...
International audienceThe rise of new technologies, and in particular Near Field Communication (NFC)...
International audienceThe rise of new technologies, and in particular Near Field Communication (NFC)...
International audienceThe rise of new technologies, and in particular Near Field Communication (NFC)...
International audienceFor many modern applications like e.g. contactless payment, and keyless system...
For many modern applications like e.g., contactless payment, and keyless systems, ensuring physical ...
Distance-bounding protocols are cryptographic protocols that securely establish an upper bound on t...
Contactless technologies are gaining more popularity everyday. Credit cards enabled with contactless...
Contactless technologies are gaining more popularity everyday. Credit cards enabled with contactless...
Distance-bounding protocols allow a verifier to both authenticate a prover and evaluate whether the ...
Distance bounding protocols allow a verifier to both authenticate a prover and evaluate whether the ...
Distance bounding protocols allow a verifier to both authenticate a prover and evaluate whether the ...
© 2018 Association for Computing Machinery. Distance-bounding protocols allow a verifier to both aut...
Authentication in conventional networks (like the Internet) is usually based upon something you know...
Abstract. Contactless technologies such as RFID, NFC, and sensor net-works are vulnerable to mafia a...
Abstract. Contactless technologies such as RFID, NFC, and sensor net-works are vulnerable to mafia a...