Back to Results
First PageMeta Content



Towards Timed Models for Cyber-Physical Security Protocols Max Kanovich∗ , Tajana Ban Kirigin† , Vivek Nigam‡ , Andre Scedrov§ and Carolyn Talcott¶ ∗ ∗
Add to Reading List

Document Date: 2014-07-01 07:22:48


Open Document

File Size: 359,39 KB

Share Result on Facebook

City

Moscow / Lincoln / /

Company

Ad Hoc Networks / T ime Ag / Needham / I. Cervesato N. A. / T ime@T SA / IEEE Journal / All About / SRI International / /

Country

United States / /

/

Event

FDA Phase / Person Communication and Meetings / /

Facility

University of Rijeka / Federal University of Para´ıba / K pub / B pub / A}K pub / University of Pennsylvania / University of London / mik@dcs.qmul.ac.uk University College / /

IndustryTerm

bank@math.uniri.hr / public key protocols / distance bounding protocol / communication technologies / cyber-physical security protocols / machinery / physical unreliable network / wireless sensor networks / sequence network / above protocol / non-zero processing time / computational tools / wireless networks / memory protocols / pervasive cyber-physical systems / machinery involving / cyberphysical protocols / cryptographic protocols / sensor networks / instantaneous processing times / cyberphysical security protocols / supreme technology / protocols cyber-physical security protocols / Wireless Sensor / distance-bounding protocols / search space / security protocols / real-time systems / distance bounding protocols / collaborative systems / bounded security protocols / cyber-physical protocols / /

Organization

University College London / National Science Foundation / University of Pennsylvania / University of Rijeka / Federal University of Para´ıba / National Research University Higher School of Economics / University of London / /

Person

Bob deT / J. A. Malcolm / V / Max Kanovich / Ban Kirigin / Ai / T. B. Kirigin / V / Bob Alice Bob / Carolyn Talcott / Andre Scedrov / Alice / B NA / Vivek Nigam / Sergei O. Kuznetsov / Mary / /

/

Position

editor / Queen / guard / timed model for cyber-physical security protocols / automated assistant for clinical investigations / intruder model / automated assistant / /

Product

T10 / A2 / S1 / t0 / /

ProvinceOrState

New Brunswick / Tennessee / /

PublishedMedium

Journal of Systems and Software / Cryptology ePrint Archive / IEEE Transactions on Information Theory / Lecture Notes in Computer Science / /

Technology

above protocol / distance bounding protocols / ultrasound / supreme technology / security protocols / cyber-physical security protocols / cyberphysical security protocols / encryption / communication technologies / Bounded memory protocols / public key / cyber-physical protocols / bounded security protocols / protocols cyber-physical security protocols / symmetric and asymmetric encryption / model public key encryption / distance-bounding protocols / radio frequency / public key protocols / distance bounding protocol / timed NeedhamSchroeder protocol / /

SocialTag