Sciweavers

SAFECOMP
2010
Springer
13 years 5 months ago
Security Analysis of Open Building Automation Systems
Abstract. With the integration of security-critical services into Building Automation Systems (BAS), the demands on the underlying network technologies increase rapidly. Relying on...
Wolfgang Granzer, Wolfgang Kastner
SAFECOMP
2010
Springer
13 years 5 months ago
Assurance of Automotive Safety - A Safety Case Approach
A safety case should provide a clear, comprehensible and defensible argument, supported by evidence, that a system is acceptably safe to operate in a particular environment. This a...
Robert Palin, Ibrahim Habli
SAFECOMP
2010
Springer
13 years 5 months ago
Deriving Safety Cases for Hierarchical Structure in Model-Based Development
Abstract. Model-based development and automated code generation are increasingly used for actual production code, in particular in mathematical and engineering domains. However, si...
Nurlida Basir, Ewen Denney, Bernd Fischer 0002
SAFECOMP
2010
Springer
13 years 5 months ago
Reliability Analysis of Safety-Related Communication Architectures
Abstract. In this paper we describe a novel concept for reliability analysis of communication architectures in safety-critical systems. This concept has been motivated by applicati...
Oliver Schulz, Jan Peleska
SAFECOMP
2010
Springer
13 years 5 months ago
Computational Concerns in the Integration of Unmanned Airborne Systems into Controlled Airspace
Unmanned Airborne Systems (UAS) offer significant benefits for long duration missions. They can also be used in situations where it is inappropriate to expose aircrew to increased ...
Christopher W. Johnson
RFIDSEC
2010
13 years 5 months ago
The Poulidor Distance-Bounding Protocol
RFID authentication protocols are susceptible to different types of relay attacks such as mafia and distance frauds. A countermeasure against these types of attacks are the well-...
Rolando Trujillo-Rasua, Benjamin Martin 0002, Gild...
RFIDSEC
2010
13 years 5 months ago
Strong Authentication and Strong Integrity (SASI) Is Not That Strong
In this work, we present a practical passive attack on SASI, an ultra-lightweight mutual authentication protocol for RFID. This attack can be used to reveal with overwhelming proba...
Gildas Avoine, Xavier Carpent, Benjamin Martin 000...
RFIDSEC
2010
13 years 5 months ago
On the Claimed Privacy of EC-RAC III
Junfeng Fan, Jens Hermans, Frederik Vercauteren
RFIDSEC
2010
13 years 5 months ago
Cryptanalysis of the David-Prasad RFID Ultralightweight Authentication Protocol
In September 2009, David and Prasad proposed at MobiSec’09 an interesting new ultralightweight mutual authentication protocol for low-cost RFID tags. In this paper, we present a ...
Julio César Hernández Castro, Pedro ...
RFIDSEC
2010
13 years 5 months ago
Optimal Security Limits of RFID Distance Bounding Protocols
Abstract. In this paper, we classify the RFID distance bounding protocols having bitwise fast phases and no final signature. We also give the theoretical security bounds for two s...
Orhun Kara, Süleyman Kardas, Muhammed Ali Bin...