Essays about: "Scyther"

Found 2 essays containing the word Scyther.

  1. 1. Evaluating intrusion detection points in an end-to-end solution

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Lilla Pankaczi; [2023]
    Keywords : RFID; Random UID; Mutual Authentication; Scyther;

    Abstract : Evaluating all intrusion detection points in an end-to-end cyber-physical system can be challenging. This master thesis focuses on evaluating the security of the most exposed part of such systems, Radio Frequency Identification (RFID) communication. READ MORE

  2. 2. Formal Verification of a LTE Security Protocol for Dual-Connectivity : An Evaluation of Automatic Model Checking Tools

    University essay from KTH/Radio Systems Laboratory (RS Lab)

    Author : Katharina Pfeffer; [2014]
    Keywords : security; authenticated key-exchange; 3GPP; LTE; formal methods; protocol verification; automated model checking; säkerhet; autentiserad etablering av nycklar; 3GPP; LTE; formella metoder; protokollverifiering; automatiserad modellverifiering;

    Abstract : Security protocols are ubiquitously used in various applications with the intention to ensure secure and private communication. To achieve this goal, a mechanism offering reliable and systematic protocol verification is needed. READ MORE