Advanced search
Found 3 essays matching the above criteria.
-
1. Formal security verification of the Drone Remote Identification Protocol using Tamarin
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : The current standard for remote identification of unmanned aircraft does not contain anyform of security considerations, opening up possibilities for impersonation attacks. Thenewly proposed Drone Remote Identification Protocol aims to change this. READ MORE
-
2. Formal security analysis of authentication in an asynchronous communication model
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Formal analysis of security protocols is becoming increasingly relevant. In formal analysis, a model is created of a protocol or system, and propositions about the security of the model are written. A program is then used to verify that the propositions hold, or find examples of where they do not. READ MORE
-
3. Formal Verification of a LTE Security Protocol for Dual-Connectivity : An Evaluation of Automatic Model Checking Tools
University essay from KTH/Radio Systems Laboratory (RS Lab)Abstract : Security protocols are ubiquitously used in various applications with the intention to ensure secure and private communication. To achieve this goal, a mechanism offering reliable and systematic protocol verification is needed. READ MORE