Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Tamarin prover
biblio
Verifying cryptographic protocols by Tamarin Prover
Submitted by aekwall on Tue, 10/12/2021 - 2:08pm
security
Cryptography
Computational modeling
privacy
pubcrawl
composability
Complexity theory
Compositionality
policy-based governance
Cryptographic Protocols
formal specifications
Planing
Session key secrecy
Tamarin prover
Verification of cryptographic protocols
protocol verification
biblio
Automated Analysis of PUF-based Protocols
Submitted by grigby1 on Wed, 01/20/2021 - 3:21pm
integrated circuit
Tamarin prover
security protocols
Security Properties
Resiliency
resilience
pufs
PUF-based protocols
PUF API
pubcrawl
Protocols
physical unclonable functions
mutual authentication protocol
integrated circuits
Analytical models
hardware-based security
Hardware
formal methods and verification
fingerprint identification
error correction data
Data models
Cryptography
Cryptographic Protocols
Compositionality
application programming interface
APIs
API
biblio
A Symbolic Analysis of ECC-Based Direct Anonymous Attestation
Submitted by aekwall on Mon, 12/07/2020 - 11:25am
symbol manipulation
Predictive Metrics
privacy
pubcrawl
public key cryptography
Resiliency
Scalability
secrecy
secrecy properties
neural style transfer
symbolic analysis
symbolic verification
Tamarin modelling
Tamarin prover
tpm
Trusted Computing
trusted platform module TPM-backed anonymous credentials
trusted platform modules
ECC-based version
authentication
composability
Cryptographic Protocols
cryptographic scheme
cyber-physical system security
digital signatures
direct anonymous attestation
ECC-based direct anonymous attestation
Analytical models
ECC-DAA
expected authentication
formal analysis
formal verification
IEC standards
ISO standards
mechanised analysis
biblio
Automated Unbounded Verification of Stateful Cryptographic Protocols with Exclusive OR
Submitted by grigby1 on Tue, 11/12/2019 - 3:30pm
Symbolic-Model
privacy
protocol verification
Protocols
pubcrawl
radiofrequency identification
RFID protocols
Security Properties
stateful cryptographic protocols
symbolic model
policy-based governance
Tamarin
Tamarin prover
Theorem Proving
tools
user-defined equational theories
verification tool
XOR operations
XOR theory
Cryptography
attack identification
automated unbounded verification
collaboration
composability
Compositionality
Computational modeling
Cryptographic Protocols
Cryptographic-Protocols
Analytical models
electronic payment protocols
equational theory
Exclusive-OR
exclusive-or operations
formal verification
Formal-Verification
Mathematical model
observational equivalence