2018 International Conference on Advanced Computer Science and Information Systems (ICACSIS) 2018
DOI: 10.1109/icacsis.2018.8618173
|View full text |Cite
|
Sign up to set email alerts
|

Formal Verification of Divide and Conquer Key Distribution Protocol Using ProVerif and TLA+

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 17 publications
0
2
0
Order By: Relevance
“…An adversary cannot track the movement of a specific UE, because the V-RNTI value that is used by UE always keeps changing [40]. e design of the proposed scheme is used to achieve security objectives without any modification imposed on any other network node except minimal modifications at two network nodes, that is, UE and eNB [23,41,42].…”
Section: Preserving Privacy Location By Using Variable Pseudonym Schemementioning
confidence: 99%
See 1 more Smart Citation
“…An adversary cannot track the movement of a specific UE, because the V-RNTI value that is used by UE always keeps changing [40]. e design of the proposed scheme is used to achieve security objectives without any modification imposed on any other network node except minimal modifications at two network nodes, that is, UE and eNB [23,41,42].…”
Section: Preserving Privacy Location By Using Variable Pseudonym Schemementioning
confidence: 99%
“…is scheme ensures the unlinkability of UEs with minimal modifications at eNB, as shown below. Besides that, it introduces a negligible computation overhead at UE and an affordable computation overhead at eNB [40,43,44]. is scheme can easily be integrated with current mobile technology, and thus, location tracking is protected by it with a minimal cost.…”
Section: Preserving Privacy Location By Using Variable Pseudonym Schemementioning
confidence: 99%