The increased functionality of EPC Class1 Gen2 (EPCGen2) is making this standard a de facto specification for inexpensive tags in the RFID industry. Recently three EPCGen2 complian...
Mike Burmester, Breno de Medeiros, Jorge Munilla, ...
To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems’ resources. These permissions rely on certai...
We describe a new algorithm for analysing security protocols that use XOR, such as key-management APIs. As a case study, we consider the IBM 4758 CCA API, which is widely used in t...
As an open source project, Open Simple Secure Transaction (OpenSST) protocol aims to be a secure and transactionoriented protocol for the unsecured network. At present a prototype...
Xinhua Zhang, Alexandre Dulaunoy, Christoph Meinel
An access control system is often viewed as a state transition system. Given a set of access control policies, a general safety requirement in such a system is to determine whethe...