Abstract: Security analysis of ad hoc routing protocols in an adversarial environment is a challenging task. The paper utilizes Event-B to model and verify the Secure Routing Protocol (SRP), a secure ...
A one-way trust model where the client trusts the server. This mode establishes a 256-bit secure bidirectional encrypted tunnel with only two round trips. It is ideal for scenarios requiring efficient ...
Abstract: This paper first investigates various attacks against Remote Keyless Entry (RKE) systems in cars. Then, we propose an authentication protocol based on Physical Unclonable Functions (PUFs) to ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results