Filters








188,688 Hits in 4.8 sec

Extending Security Protocol Analysis: New Challenges

Mike Bond, Jolyon Clulow
2005 Electronical Notes in Theoretical Computer Science  
We argue that formal analysis tools for security protocols are not achieving their full potential, and give only limited aid to designers of more complex modern protocols, protocols in constrained environments  ...  Using simple example protocols, we illustrate a number of attacks that are vital to avoid in security API design, but that have yet to be modelled using a formal analysis tool.  ...  We believe that tools that can begin to address the three challenges we have presented would be invaluable to todays protocol and security API designers, as they face the new security challenges of tomorrow's  ... 
doi:10.1016/j.entcs.2004.09.036 fatcat:ai2ehglhprauxoijgo4hvskpha

Extended verification of secure UAANET routing protocol

Jean-Aime Maxa, Mohamed Slim Ben Mahmoud, Nicolas Larrieu
2016 2016 IEEE/AIAA 35th Digital Avionics Systems Conference (DASC)  
In this paper, we present a new UAANET secure routing protocol called SUAP (Secure Uav Ad hoc routing Protocol).  ...  We have carried out a formal verification analysis of SUAP security properties using the AVISPA tool, an automated model checker for the analysis of security features.  ...  In this paper, we have presented an extended approach to security analysis and validation of a new secure UAANET routing protocol (SUAP).  ... 
doi:10.1109/dasc.2016.7777970 fatcat:itfisia6ffb5lpygqckdxczloy

LASER: Lightweight And SEcure Remote keyless entry protocol (Extended version) [article]

Vanesa Daza, Xavier Salleras
2019 arXiv   pre-print
Attacks such as jamming-and-replay attacks and relay attacks are still effective against most recent RKE systems, even when many secure schemes have been designed.  ...  Since Remote Keyless Entry (RKE) systems started to be widely used, several vulnerabilities in their protocols have been found.  ...  As such, the need for new secure and easy-to-implement schemes becomes clear. Implementation of the attacks.  ... 
arXiv:1905.05694v2 fatcat:batwymiytrbwherhuqgen5csmq

Security Analysis of the Extended Access Control Protocol for Machine Readable Travel Documents [chapter]

Özgür Dagdelen, Marc Fischlin
2011 Lecture Notes in Computer Science  
Furthermore, we discuss that the protocol achieves some of the properties guaranteed by the extended CK security model of LaMacchia, Lauter and Mityagin (ProvSec 2008).  ...  We analyze the Extended Access Control (EAC) protocol for authenticated key agreement, recently proposed by the German Federal Office for Information Security (BSI) for the deployment in machine readable  ...  This work was supported by the German Federal Office for Information Security (BSI) and CASED (http://www.cased.de).  ... 
doi:10.1007/978-3-642-18178-8_6 fatcat:72pgyf4hujch5ms3uazp65mbou

Extending cryptographic logics of belief to key agreement protocols

Paul van Oorschot
1993 Proceedings of the 1st ACM conference on Computer and communications security - CCS '93  
In this section we propose new refinements to allow more precise reasoning for protocols involving jointly established keys.  ...  The extended logic is used to analyze three Diffie-Hellman based key agreement protocols, facilitating direct comparison of these protocols with respect to formal goals reached and formal assumptions required  ...  Analysis using the extended logic has allowed direct comparison of the assumptions and goals of four authentication protocols.  ... 
doi:10.1145/168588.168617 dblp:conf/ccs/Oorschot93 fatcat:afjsgposdfdd3fyrbrpmlhoipu

The New Reality of Bangladesh: A Critical Analysis of New Normal Challenges and Opportunities

Umme Sayeda
2020 PanAfrican Journal of Governance and Development  
, virtualization of the tourist industry (application of Extended Reality), application of Career Resilience (CR), and Strategic Flexibility Analysis tools in the re-employment and career development,  ...  But the reshaping of such a new reality will itself prevail as a considerable challenge for Bangladesh.  ...  The present analysis applied the hypothesis of Bangladesh's post-pandemic normalization challenges.  ... 
doi:10.46404/panjogov.v1i2.2336 fatcat:mz3oop23uval7eqnrorcy62p74

NEW ANALYSIS OF INTERNATIONAL PROTECTION OF REFUGEES

MADALIA COCOSATU
2012 Challenges of the Knowledge Society  
Introduction The paper "New analysis of International Protection of Refugees" aims to analyse in an interdisciplinary manner the tendencies and causes of the increase of the refugee phenomenon and to conduct  ...  apply the dispositions of the Convention and of the Protocol, under the careful supervision of the High Commission.  ... 
doaj:217833de733849019f7a7e13b2c278f9 fatcat:w22lkg5sv5fnndvmfvdki5lmpu

Cyber security in New Space

M. Manulis, C. P. Bridges, R. Harrison, V. Sekar, A. Davis
2020 International Journal of Information Security  
New and proposed constellations will increase the in-orbit satellite population by the order of thousands, expanding the threat landscape of the space industry.  ...  Key technology advancements and open issues in the satellite industry related to security and operational requirements are also discussed.  ...  This paper therefore aims to provide an analysis of the New Space era in terms of the previous security threats, emerging security challenges and key technologies which are advancing and innovating the  ... 
doi:10.1007/s10207-020-00503-w fatcat:hmm5ixpknnhpta6zagiepkskoy

Addressing New Challenges by Building Security Protocols Around Graphs [chapter]

Kamil Kulesza, Zbigniew Kotulski
2005 Lecture Notes in Computer Science  
While having all the functionality of their number based counterparts; such protocols can have extended capabilities, especially useful in the field of verification and analysis.  ...  We propose the use of graphs as basic objects in security protocols.  ...  Examples are: graph colouring, graph isomorphism and Hamiltonian paths, all of which can be used to provide extended capabilities for security protocols.  ... 
doi:10.1007/11542322_36 fatcat:evyuymqkm5futkhzeehd6yguki

BYOD Security: A New Business Challenge [article]

K. Downer, Maumita Bhattacharya
2016 arXiv   pre-print
This paper focuses on two key BYOD security issues: security challenges and available frameworks.  ...  A taxonomy specifically classifying BYOD security challenges is introduced alongside comprehensive frameworks and solutions which are also analysed to gauge their limitations.  ...  This paper introduces a new taxonomy for categorising BYOD security challenges inspired by those used for classifying network security threats taught by Hansman [18] .  ... 
arXiv:1601.01230v1 fatcat:babvftxowne7ll44nfleknz4ke

Trusted computing - A new challenge for embedded systems

Romain Vaslin, Guy Gogniat, Jean-Philippe Diguet, Alain Pegatoquet
2006 2006 13th IEEE International Conference on Electronics, Circuits and Systems  
Security issues become more and more important during the development of mobile devices.  ...  A discussion about the limitations of existing solutions is provided and new directions are proposed.  ...  Such features are very interesting for embedded systems and have been extended to the security domain.  ... 
doi:10.1109/icecs.2006.379904 dblp:conf/icecsys/VaslinGDP06 fatcat:ys6si4vxy5fklfts6tf24zqdoq

New challenges in franchisor-franchisee relationship. An analysis from agency theory perspective

Guillermo Navarro Sanfelix, Francisco Puig
2018 Cuadernos de Gestión  
As a result of this analysis we put forward a set of propositions that suggest, with certain organizational assumptions, the need for a new, more flexible, and cooperative conceptual model between the  ...  For AT, the main unit of analysis is the contract established between the parties, which are linked.  ... 
doi:10.5295/cdg.150610gn fatcat:zwgjblj3xvbz3exx4p6ef7ywnq

The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved [article]

Wei Zhou, Yuqing Zhang, Peng Liu
2018 arXiv   pre-print
Then, the security and privacy effects of eight IoT new features were discussed including the threats they cause, existing solutions and challenges yet to be solved.  ...  To better understand the essential reasons of new threats and the challenges in current research, this survey first proposes the concept of "IoT features".  ...  Zhou, Yuqing Zhang, and Peng Liu, Member, IEEE The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved Wei W TABLE I THREATS I , CHALLENGES  ... 
arXiv:1802.03110v1 fatcat:4ikey6amyzfktawcmpo4z7ke5u

Domain Name System Security and Privacy: Old Problems and New Challenges [article]

Ah Reum Kang and Jeffrey Spaulding and Aziz Mohaisen
2016 arXiv   pre-print
In this paper, we review the various activities in the research community on DNS operation, security, and privacy, and outline various challenges and open research directions that need to be tackled.  ...  The domain name system (DNS) is an important protocol in today's Internet operation, and is the standard naming convention between domain names, names that are easy to read, understand, and remember by  ...  An extending formalization of the capabilities of the adversaries using real-world DNS resolution topology and DNS query data would be another challenge.  ... 
arXiv:1606.07080v1 fatcat:oxuavhsuxnh3bnsuk2sb67rumy

Interoperability-Centric Problems: New Challenges and Legal Solutions

T. A. Beydogan
2010 International Journal of Law and Information Technology  
In this regard, this study elaborates both general concerns and specific topics with regard to ensuring interoperability such as the NGN-related challenges, net neutrality discussions.  ...  Access and Framework Directives, how to understand and reinforce it within converging markets, i.e. new media, telecom and IT markets is unclear on part of regulators as well as many practitioners.  ...  New ECRF is predominantly based on competition law methodology, particularly by means of market analysis and the concept of proportionate regulation.  ... 
doi:10.1093/ijlit/eaq008 fatcat:rparfwq4sfdcpijku56aqyctme
« Previous Showing results 1 — 15 out of 188,688 results