A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Extending Security Protocol Analysis: New Challenges
2005
Electronical Notes in Theoretical Computer Science
We argue that formal analysis tools for security protocols are not achieving their full potential, and give only limited aid to designers of more complex modern protocols, protocols in constrained environments ...
Using simple example protocols, we illustrate a number of attacks that are vital to avoid in security API design, but that have yet to be modelled using a formal analysis tool. ...
We believe that tools that can begin to address the three challenges we have presented would be invaluable to todays protocol and security API designers, as they face the new security challenges of tomorrow's ...
doi:10.1016/j.entcs.2004.09.036
fatcat:ai2ehglhprauxoijgo4hvskpha
Extended verification of secure UAANET routing protocol
2016
2016 IEEE/AIAA 35th Digital Avionics Systems Conference (DASC)
In this paper, we present a new UAANET secure routing protocol called SUAP (Secure Uav Ad hoc routing Protocol). ...
We have carried out a formal verification analysis of SUAP security properties using the AVISPA tool, an automated model checker for the analysis of security features. ...
In this paper, we have presented an extended approach to security analysis and validation of a new secure UAANET routing protocol (SUAP). ...
doi:10.1109/dasc.2016.7777970
fatcat:itfisia6ffb5lpygqckdxczloy
LASER: Lightweight And SEcure Remote keyless entry protocol (Extended version)
[article]
2019
arXiv
pre-print
Attacks such as jamming-and-replay attacks and relay attacks are still effective against most recent RKE systems, even when many secure schemes have been designed. ...
Since Remote Keyless Entry (RKE) systems started to be widely used, several vulnerabilities in their protocols have been found. ...
As such, the need for new secure and easy-to-implement schemes becomes clear. Implementation of the attacks. ...
arXiv:1905.05694v2
fatcat:batwymiytrbwherhuqgen5csmq
Security Analysis of the Extended Access Control Protocol for Machine Readable Travel Documents
[chapter]
2011
Lecture Notes in Computer Science
Furthermore, we discuss that the protocol achieves some of the properties guaranteed by the extended CK security model of LaMacchia, Lauter and Mityagin (ProvSec 2008). ...
We analyze the Extended Access Control (EAC) protocol for authenticated key agreement, recently proposed by the German Federal Office for Information Security (BSI) for the deployment in machine readable ...
This work was supported by the German Federal Office for Information Security (BSI) and CASED (http://www.cased.de). ...
doi:10.1007/978-3-642-18178-8_6
fatcat:72pgyf4hujch5ms3uazp65mbou
Extending cryptographic logics of belief to key agreement protocols
1993
Proceedings of the 1st ACM conference on Computer and communications security - CCS '93
In this section we propose new refinements to allow more precise reasoning for protocols involving jointly established keys. ...
The extended logic is used to analyze three Diffie-Hellman based key agreement protocols, facilitating direct comparison of these protocols with respect to formal goals reached and formal assumptions required ...
Analysis using the extended logic has allowed direct comparison of the assumptions and goals of four authentication protocols. ...
doi:10.1145/168588.168617
dblp:conf/ccs/Oorschot93
fatcat:afjsgposdfdd3fyrbrpmlhoipu
The New Reality of Bangladesh: A Critical Analysis of New Normal Challenges and Opportunities
2020
PanAfrican Journal of Governance and Development
, virtualization of the tourist industry (application of Extended Reality), application of Career Resilience (CR), and Strategic Flexibility Analysis tools in the re-employment and career development, ...
But the reshaping of such a new reality will itself prevail as a considerable challenge for Bangladesh. ...
The present analysis applied the hypothesis of Bangladesh's post-pandemic normalization challenges. ...
doi:10.46404/panjogov.v1i2.2336
fatcat:mz3oop23uval7eqnrorcy62p74
NEW ANALYSIS OF INTERNATIONAL PROTECTION OF REFUGEES
2012
Challenges of the Knowledge Society
Introduction The paper "New analysis of International Protection of Refugees" aims to analyse in an interdisciplinary manner the tendencies and causes of the increase of the refugee phenomenon and to conduct ...
apply the dispositions of the Convention and of the Protocol, under the careful supervision of the High Commission. ...
doaj:217833de733849019f7a7e13b2c278f9
fatcat:w22lkg5sv5fnndvmfvdki5lmpu
Cyber security in New Space
2020
International Journal of Information Security
New and proposed constellations will increase the in-orbit satellite population by the order of thousands, expanding the threat landscape of the space industry. ...
Key technology advancements and open issues in the satellite industry related to security and operational requirements are also discussed. ...
This paper therefore aims to provide an analysis of the New Space era in terms of the previous security threats, emerging security challenges and key technologies which are advancing and innovating the ...
doi:10.1007/s10207-020-00503-w
fatcat:hmm5ixpknnhpta6zagiepkskoy
Addressing New Challenges by Building Security Protocols Around Graphs
[chapter]
2005
Lecture Notes in Computer Science
While having all the functionality of their number based counterparts; such protocols can have extended capabilities, especially useful in the field of verification and analysis. ...
We propose the use of graphs as basic objects in security protocols. ...
Examples are: graph colouring, graph isomorphism and Hamiltonian paths, all of which can be used to provide extended capabilities for security protocols. ...
doi:10.1007/11542322_36
fatcat:evyuymqkm5futkhzeehd6yguki
BYOD Security: A New Business Challenge
[article]
2016
arXiv
pre-print
This paper focuses on two key BYOD security issues: security challenges and available frameworks. ...
A taxonomy specifically classifying BYOD security challenges is introduced alongside comprehensive frameworks and solutions which are also analysed to gauge their limitations. ...
This paper introduces a new taxonomy for categorising BYOD security challenges inspired by those used for classifying network security threats taught by Hansman [18] . ...
arXiv:1601.01230v1
fatcat:babvftxowne7ll44nfleknz4ke
Trusted computing - A new challenge for embedded systems
2006
2006 13th IEEE International Conference on Electronics, Circuits and Systems
Security issues become more and more important during the development of mobile devices. ...
A discussion about the limitations of existing solutions is provided and new directions are proposed. ...
Such features are very interesting for embedded systems and have been extended to the security domain. ...
doi:10.1109/icecs.2006.379904
dblp:conf/icecsys/VaslinGDP06
fatcat:ys6si4vxy5fklfts6tf24zqdoq
New challenges in franchisor-franchisee relationship. An analysis from agency theory perspective
2018
Cuadernos de Gestión
As a result of this analysis we put forward a set of propositions that suggest, with certain organizational assumptions, the need for a new, more flexible, and cooperative conceptual model between the ...
For AT, the main unit of analysis is the contract established between the parties, which are linked. ...
doi:10.5295/cdg.150610gn
fatcat:zwgjblj3xvbz3exx4p6ef7ywnq
The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved
[article]
2018
arXiv
pre-print
Then, the security and privacy effects of eight IoT new features were discussed including the threats they cause, existing solutions and challenges yet to be solved. ...
To better understand the essential reasons of new threats and the challenges in current research, this survey first proposes the concept of "IoT features". ...
Zhou, Yuqing Zhang, and Peng Liu, Member, IEEE The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved Wei W
TABLE I THREATS I , CHALLENGES ...
arXiv:1802.03110v1
fatcat:4ikey6amyzfktawcmpo4z7ke5u
Domain Name System Security and Privacy: Old Problems and New Challenges
[article]
2016
arXiv
pre-print
In this paper, we review the various activities in the research community on DNS operation, security, and privacy, and outline various challenges and open research directions that need to be tackled. ...
The domain name system (DNS) is an important protocol in today's Internet operation, and is the standard naming convention between domain names, names that are easy to read, understand, and remember by ...
An extending formalization of the capabilities of the adversaries using real-world DNS resolution topology and DNS query data would be another challenge. ...
arXiv:1606.07080v1
fatcat:oxuavhsuxnh3bnsuk2sb67rumy
Interoperability-Centric Problems: New Challenges and Legal Solutions
2010
International Journal of Law and Information Technology
In this regard, this study elaborates both general concerns and specific topics with regard to ensuring interoperability such as the NGN-related challenges, net neutrality discussions. ...
Access and Framework Directives, how to understand and reinforce it within converging markets, i.e. new media, telecom and IT markets is unclear on part of regulators as well as many practitioners. ...
New ECRF is predominantly based on competition law methodology, particularly by means of market analysis and the concept of proportionate regulation. ...
doi:10.1093/ijlit/eaq008
fatcat:rparfwq4sfdcpijku56aqyctme
« Previous
Showing results 1 — 15 out of 188,688 results