-
1
Formal Verification of the xDAuth Protocol
Published 2016“…This paper focuses on the formal verification of the xDAuth protocol, which is one of the prominent protocols for identity management in cross domain scenarios. …”
Article -
2
Formal verification of RFID system using model verification agent
Published 2012“…Although many researches have been done on the RFID system, research on formal verification of RFID system has not yet been fully explored. …”
Get full text
Thesis -
3
-
4
Verifikasi Command Transfer Protocol Menggunakan SPIN
Published 2014“…Formal verification adalah metode untuk membuktikan bahwa sebuah implementasi betul-betul mengimplementasikan apa yang dijabarkan dalam bentuk spesifikasinya. …”
Get full text
Conference or Workshop Item -
5
HOOPOE: High performance and efficient anonymous handover authentication protocol for flying out of zone UAVs
Published 2023“…The protocol's security was proved using the formal verification ROR model and automated security verifier ProVerif tool to validate the protocol resistance against various attacks and provided forward secrecy. …”
Article -
6
An efficient authentication and key agreement protocol for 4G (LTE) networks
Published 2014“…The automated validation of internet security protocols and applications (AVISPA) tool is used to provide a formal verification. Results show that the proposed EEPS-AKA is efficient and secure against active and passive attacks.…”
Get full text
Conference or Workshop Item -
7
Blockchain-based access control scheme for secure shared personal health records over decentralised storage
Published 2021“…Furthermore, security validation is verified by simulating a formal verification scenario using Automated Validation of Internet Security Protocols and Applications (AVISPA), thereby unveiling that SC-ABSE is resistant to man-in-the-middle (MIM) and replay attacks. …”
Article -
8
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The proposed schemes have been validated using informal and formal security verification to compare the achieved security features against various attacks. The formal verification is performed using BAN logic to prove the security and mutual authentications. …”
Get full text
Thesis -
9
Toward efficient attribute-based searchable encryption for access control over blockchain
Published 2021“…Furthermore, security validation is verified by simulating a formal verification scenario using Automated Validation of Internet Security Protocols and Applications (AVISPA), thereby unveiling that BC-ABSE is resistant to man-in-themiddle (MIM) and replay attacks. …”
Get full text
Thesis -
10
Security and performance enhancement of authentication protocols in heterogeneous wireless networks
Published 2017“…The Automated Validation of Internet Security Protocols and Applications (AVISPA) tool is used to provide a formal verification. Results show that the proposed protocols are efficient and secure against active and passive attacks.…”
Get full text
Thesis