Showing 1 - 10 results of 10 for search '"formal verification"', query time: 0.04s Refine Results
  1. 1

    Formal Verification of the xDAuth Protocol by Alam, Q., Tabbasum, S., Malik, S.U.R., Alam, M., Ali, T., Akhunzada, A., Khan, S.U., Vasilakos, A.V., Buyya, R.

    Published 2016
    “…This paper focuses on the formal verification of the xDAuth protocol, which is one of the prominent protocols for identity management in cross domain scenarios. …”
    Article
  2. 2

    Formal verification of RFID system using model verification agent by Lockman, Muhammad Tarmizi

    Published 2012
    “…Although many researches have been done on the RFID system, research on formal verification of RFID system has not yet been fully explored. …”
    Get full text
    Thesis
  3. 3
  4. 4

    Verifikasi Command Transfer Protocol Menggunakan SPIN by Dewi, Ervin Kusuma, Pulungan, Reza

    Published 2014
    “…Formal verification adalah metode untuk membuktikan bahwa sebuah implementasi betul-betul mengimplementasikan apa yang dijabarkan dalam bentuk spesifikasinya. …”
    Get full text
    Conference or Workshop Item
  5. 5

    HOOPOE: High performance and efficient anonymous handover authentication protocol for flying out of zone UAVs by Khalid, Haqi, Hashim, Shaiful Jahari, Hashim, Fazirulhisyam, Syed Ahamed, Sharifah Mumtazah, Chaudhary, Muhammad Akmal, Altarturi, Hamza H. M., Saadoon, Muntadher

    Published 2023
    “…The protocol's security was proved using the formal verification ROR model and automated security verifier ProVerif tool to validate the protocol resistance against various attacks and provided forward secrecy. …”
    Article
  6. 6

    An efficient authentication and key agreement protocol for 4G (LTE) networks by Alezabi, Kamal Ali, Hashim, Fazirulhisyam, Hashim, Shaiful Jahari, Mohd Ali, Borhanuddin

    Published 2014
    “…The automated validation of internet security protocols and applications (AVISPA) tool is used to provide a formal verification. Results show that the proposed EEPS-AKA is efficient and secure against active and passive attacks.…”
    Get full text
    Conference or Workshop Item
  7. 7

    Blockchain-based access control scheme for secure shared personal health records over decentralised storage by Hussien, Hassan Mansur, Md Yasin, Sharifah, Udzir, Nur Izura, Ninggal, Mohd Izuan Hafez

    Published 2021
    “…Furthermore, security validation is verified by simulating a formal verification scenario using Automated Validation of Internet Security Protocols and Applications (AVISPA), thereby unveiling that SC-ABSE is resistant to man-in-the-middle (MIM) and replay attacks. …”
    Article
  8. 8

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…The proposed schemes have been validated using informal and formal security verification to compare the achieved security features against various attacks. The formal verification is performed using BAN logic to prove the security and mutual authentications. …”
    Get full text
    Thesis
  9. 9

    Toward efficient attribute-based searchable encryption for access control over blockchain by Hussein, Al-Abadi Hassan Mansur

    Published 2021
    “…Furthermore, security validation is verified by simulating a formal verification scenario using Automated Validation of Internet Security Protocols and Applications (AVISPA), thereby unveiling that BC-ABSE is resistant to man-in-themiddle (MIM) and replay attacks. …”
    Get full text
    Thesis
  10. 10

    Security and performance enhancement of authentication protocols in heterogeneous wireless networks by Alezabi, Kamal Ali Ahmed

    Published 2017
    “…The Automated Validation of Internet Security Protocols and Applications (AVISPA) tool is used to provide a formal verification. Results show that the proposed protocols are efficient and secure against active and passive attacks.…”
    Get full text
    Thesis