Verification of PUF-based IoT Protocols with AVISPA and Scyther.
Tomás RabasRóbert LórenczJirí BucekPublished in: SECRYPT (2022)
Keyphrases
- cryptographic protocols
- model checking
- management system
- electronic devices
- big data
- cloud computing
- protocol specification
- formal verification
- signature verification
- formal analysis
- verification method
- high security
- communication protocol
- security protocols
- data sets
- face verification
- mobile phone
- multi agent
- learning algorithm
- databases