Proceedings of the 8th International Conference on Bio-Inspired Information and Communications Technologies (Formerly BIONETICS 2015
DOI: 10.4108/icst.bict.2014.258027
|View full text |Cite
|
Sign up to set email alerts
|

Cryptofraglets Reloaded - Bioinspired Security Modeling of a RFID Protocol and Properties

Abstract: Fraglets represent an execution model for communication protocols that resembles the chemical reactions in living organisms. The strong connection between their way of transforming and reacting and formal rewriting systems makes a fraglet program amenable to automatic verification. Starting from past work where the model has been enriched and executed to specify security protocols and properties (leading to the definition of cryptofraglets), this paper updates cryptofraglets and gives examples of concrete samp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
4
0

Year Published

2016
2016
2016
2016

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(4 citation statements)
references
References 19 publications
0
4
0
Order By: Relevance
“…The cryptographic version of fraglets, namely the cryptofraglets, was firstly introduced in [24,15], In [25], new instructions for hashing and message authentication coding, and their verification, were introduced. Table 3 shows the entire set of cryptographic instructions.…”
Section: Fragletsmentioning
confidence: 99%
See 3 more Smart Citations
“…The cryptographic version of fraglets, namely the cryptofraglets, was firstly introduced in [24,15], In [25], new instructions for hashing and message authentication coding, and their verification, were introduced. Table 3 shows the entire set of cryptographic instructions.…”
Section: Fragletsmentioning
confidence: 99%
“…That was the main reason why cryptofraglets were born, first from a theoretical point of view, then realising a prototypal implementation of cryptofraglets in Maude to run some toy example analyses [17]. Successively, the implementation was extended in [25], to deal with a larger set of cryptographic primitives, widely adopted in standard security protocols.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations