Mobile Values, New Names, and Secure Communication, Proc. 28th Symposium on Principles of Programming Languages (POPL'01), pp.104-115, 2001. ,
URL : https://hal.archives-ouvertes.fr/hal-01423924
Security of Distance-Bounding: A Survey, ACM Comput. Surv, vol.51, 2019. ,
URL : https://hal.archives-ouvertes.fr/hal-02470057
A framework for analyzing RFID distance bounding protocols, Journal of Computer Security, vol.19, pp.289-317, 2011. ,
A terrorist-fraud resistant and extractor-free anonymous distance-bounding protocol, Proc. 12th ACM Asia Conference on Computer and Communications Security, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01588560
An efficient distance bounding RFID authentication protocol: balancing falseacceptance rate and memory requirement, International Conference on Information Security, pp.250-261, 2009. ,
Formal reasoning about physical properties of security protocols, ACM Transactions on Information and System Security (TISSEC), vol.14, p.16, 2011. ,
A Formal Analysis of 5G Authentication, 25th ACM Conference on Computer and Communications Security (CCS'18), 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01898050
Verified Models and Reference Implementations for the TLS 1.3 Standard Candidate, IEEE Symposium on Security and Privacy (S&P'17), pp.483-503, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01575920
An Efficient Cryptographic Protocol Verifier Based on Prolog Rules, Proc. 14th Computer Security Foundations Workshop (CSFW'01), pp.82-96, 2001. ,
Modeling and Verifying Security Protocols with the Applied Pi Calculus and ProVerif, Foundations and Trends in Privacy and Security, vol.1, pp.1-135, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01423760
Symbolic and computational mechanized verification of the ARINC823 avionic protocols, 2017 IEEE 30th Computer Security Foundations Symposium (CSF). IEEE, pp.68-82, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01575861
Security Analysis and Implementation of Relay-Resistant Contactless Payments, Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020. ,
URL : https://hal.archives-ouvertes.fr/hal-02917076
Secure and lightweight distance-bounding, International Workshop on Lightweight Cryptography for Security and Privacy, pp.97-113, 2013. ,
Distance-bounding protocols, Workshop on the Theory and Application of of Cryptographic Techniques, pp.344-359, 1993. ,
A Prover-Anonymous and Terrorist-Fraud Resistant Distance-Bounding Protocol, Proc. 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, (WISEC'16), pp.121-133, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01510800
SECTOR: secure tracking of node encounters in multi-hop wireless networks, Proc. 1st ACM workshop on Security of ad hoc and sensor networks, pp.21-32, 2003. ,
Verification of randomized security protocols, Proc. 32nd Annual ACM/IEEE Symposium on Logic in Computer Science, (LICS'17), pp.1-12, 2017. ,
Modelling and Analysis of a Hierarchy of Distance Bounding Attacks, Proc. 27th USENIX Security Symposium, 2018. ,
Relay Cost Bounding for Contactless EMV Payments, Proc. 19th International Conference on Financial Cryptography and Data Security (FC'15), vol.8975, 2015. ,
BeleniosVS: Secrecy and Verifiability against a Corrupted Voting Device, 2019 IEEE 32nd Computer Security Foundations Symposium (CSF). IEEE, pp.367-36714, 2019. ,
URL : https://hal.archives-ouvertes.fr/hal-02126077
A formal analysis of the Neuchâtel e-voting protocol, 3rd IEEE European Symposium on Security and Privacy (EuroSP'18), pp.430-442, 2018. ,
Distance hijacking attacks on distance bounding protocols, Proc. IEEE Symposium on Security and Privacy (S&P'12), pp.113-127, 2012. ,
Symbolic verification of distance bounding protocols, Proc. 8th International Conference on Principles of Security and Trust (POST'19) (LNCS), 2019. ,
URL : https://hal.archives-ouvertes.fr/hal-02018280
A Symbolic Framework to Analyse Physical Proximity in Security Protocols, Proc. 38th IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science, (FSTTCS'18) (LIPIcs), vol.122, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-02390222
Symbolic analysis of terrorist fraud resistance, ESORICS'19, 2019. ,
URL : https://hal.archives-ouvertes.fr/hal-02171218
Major security problems with the 'unforgeable'(Feige)-Fiat-Shamir proofs of identity and how to overcome them, Proceedings of SECURICOM, vol.88, pp.15-17, 1988. ,
Special uses and abuses of the Fiat-Shamir passport protocol, Conference on the Theory and Application of Cryptographic Techniques, pp.21-39, 1987. ,
On the Security of Public Key Protocols, Proc. 22nd Symposium on Foundations of Computer Science (FCS'81), pp.350-357, 1981. ,
Automated Unbounded Verification of Stateful Cryptographic Protocols with Exclusive OR, CSF'2018 -31st IEEE Computer Security Foundations Symposium, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01780603
Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks, 2007. ,
, USENIX security symposium, vol.312
A Formal Approach to Distance-Bounding RFID Protocols, Proc. 14th International Conference on Information Security (ISC'11), vol.7001, 2011. ,
EMV Contactless Specifications for Payment Systems, version 2.6, 2016. ,
Subtle kinks in distance-bounding: an analysis of prominent protocols, Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks, pp.195-206, 2013. ,
Relay attacks on passive keyless entry and start systems in modern cars, Proceedings of the Network and Distributed System Security Symposium (NDSS). Eidgenössische Technische Hochschule Zürich, 2011. ,
Security Analysis of Contactless Communication Protocols, 2018. ,
URL : https://hal.archives-ouvertes.fr/tel-02536478
,
, A Spectral Analysis of Noise: A Comprehensive, Automated, Formal Analysis of Diffie-Hellman Protocols, USENIX Security Symposium'20
Improving automated symbolic analysis of ballot secrecy for e-voting protocols: A method based on sufficient conditions, IEEE European Symposium on Security and Privacy (EuroS&P'19), 2019. ,
URL : https://hal.archives-ouvertes.fr/hal-02368857
Proximity check for communication devices, US Patent, vol.9, p.228, 2017. ,
Efficient Public-Key Distance Bounding Protocol, Advances in Cryptology -ASI-ACRYPT 2016 -22nd International Conference on the Theory and Application of Cryptology and Information Security, vol.10032, pp.873-901, 2016. ,
The Swiss-Knife RFID Distance Bounding Protocol, Proc. 11th International Conference on Information Security and Cryptology (ICISC'08), vol.5461, 2008. ,
Automated verification for secure messaging protocols and their implementations: A symbolic and computational approach, 2017 IEEE European Symposium on Security and Privacy (EuroS&P), pp.435-450, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01575923
Distance-Bounding Protocols: Verification without Time and Location, Proc. 39th IEEE Symposium on Security and Privacy (S&P'18, pp.152-169, 2018. ,
Post-Collusion Security and Distance Bounding, Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019. ,
A class of precomputation-based distance-bounding protocols, Proc. 1st IEEE European Symposium on Security and Privacy (EuroS&P'16), 2016. ,
Distance bounding protocols: Authentication logic analysis and collusion attacks. In Secure localization and time synchronization for wireless sensor and ad hoc networks, pp.279-298, 2007. ,
The Tamarin Prover for the Symbolic Analysis of Security Protocols, Proc. 25th International Conference on Computer Aided Verification (CAV'13) (LNCS), 2013. ,
Undecidability of bounded security protocols, Workshop on Formal Methods and Security Protocols, 1999. ,
Distance bounding protocols for RFID enhanced by using void-challenges and analysis in noisy channels, Wireless communications and mobile computing, vol.8, pp.1227-1232, 2008. ,
Towards the Automated Verification of Cyber-Physical Security Protocols: Bounding the Number of Timed Intruders, Proc. 21st European Symposium on Research in Computer Security (ESORICS'16), pp.450-470, 2016. ,