Tutorial on message sequence charts
Computer Networks and ISDN Systems - Special issue on SDL and MSC
Introduction to Process Algebra
Introduction to Process Algebra
Proceedings of the 2007 ACM symposium on Applied computing
RFID Protocol Enabling Ownership Transfer to Protect against Traceability and DoS Attacks
ISDPE '07 Proceedings of the The First International Symposium on Data, Privacy, and E-Commerce
RFID authentication protocol for low-cost tags
WiSec '08 Proceedings of the first ACM conference on Wireless network security
The modelling and analysis of security protocols: the csp approach
The modelling and analysis of security protocols: the csp approach
Two Security Problems of RFID Security Method with Ownership Transfer
NPC '08 Proceedings of the 2008 IFIP International Conference on Network and Parallel Computing
rfidDOT: RFID delegation and ownership transfer made simple
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Enhanced RFID Security Method with Ownership Transfer
CIS '08 Proceedings of the 2008 International Conference on Computational Intelligence and Security - Volume 02
Strong and robust RFID authentication enabling perfect ownership transfer
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Reassignment scheme of an RFID tag’s key for owner transfer
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Operational semantics of security protocols
SMTT'03 Proceedings of the 2003 international conference on Scenarios: models, Transformations and Tools
A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags
SAC'05 Proceedings of the 12th international conference on Selected Areas in Cryptography
An access control model for mobile physical objects
Proceedings of the 15th ACM symposium on Access control models and technologies
EC-RAC: enriching a capacious RFID attack collection
RFIDSec'10 Proceedings of the 6th international conference on Radio frequency identification: security and privacy issues
Practical RFID ownership transfer scheme
Journal of Computer Security - 2010 Workshop on RFID Security (RFIDSec'10 Asia)
Security analysis of two recently proposed RFID authentication protocols
Frontiers of Computer Science in China
Fairness in non-repudiation protocols
STM'11 Proceedings of the 7th international conference on Security and Trust Management
Secure multiple group ownership transfer protocol for mobile RFID
Electronic Commerce Research and Applications
Secure and practical threshold RSA
Proceedings of the 6th International Conference on Security of Information and Networks
Hi-index | 0.00 |
We present a formal model for stateful security protocols. This model is used to define ownership and ownership transfer as concepts as well as security properties. These definitions are based on an intuitive notion of ownership related to physical ownership. They are aimed at RFID systems, but should be applicable to any scenario sharing the same intuition of ownership. We discuss the connection between ownership and the notion of desynchronization resistance and give the first formal definition of the latter. We apply our definitions to existing RFID protocols, exhibiting attacks on desynchronization resistance, secure ownership, and secure ownership transfer.