The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Nations and individuals are becoming increasingly dependent on information communication systems as they continue to evolve rapidly. As the number of information systems requiring protection increases, the costs also increase proportionally. Cyber attacks have the characteristic that preventive measures are not quite effective even when comprehensive information security measures are taken in advance,...
The common criteria for information technology security evaluation (CC) is an international standard for evaluating secure computer systems. To obtain high evaluation assurance level, CC requires formalism in the development class. In the security policy modeling of CC v3.1, the use of formal methods is mandatory. This paper gives a guideline for developing formal security policy model with Z notation...
A radio frequency identification (RFID) is an important part in mobile and ubiquitous domain, and brings enormous productivity benefits in applications where objects require automatic identification. However, this pervasive use of RFID tags opens up the possibility of various attacks that violate user privacy and authentication. Security mechanisms for RFID systems are therefore of the utmost important...
Generally, security protocols have been designed and verified using informal techniques. In the result, it is now well recognized that many security protocols which were previously proposed have found to be vulnerable later on. In this paper, we model and verify of the ASK protocol, which is a complicated mobile security protocol. After showing the vulnerability of the ASK protocol using formal verification...
Owing to the explosive growth of the Internet, various electronic payment systems have been studied and suggested. The security of electronic payment protocols is of particular interest to researchers in academia and industry. However, current electronic cash protocols are not offering adequate security of user information. The BCY protocols (Beller, Chang, and Yacov) are electronic commerce protocols...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.