A Formal Security Analysis of ERTMS Train to Trackside Protocols.
Joeri de RuiterRichard J. ThomasTom ChothiaPublished in: RSSRail (2016)
Keyphrases
- security analysis
- authentication protocol
- key exchange
- security properties
- mutual authentication
- secure electronic
- smart card
- security requirements
- public key
- security model
- image encryption
- formal model
- high security
- encryption scheme
- authentication scheme
- encryption algorithm
- cryptographic protocols
- key distribution
- user authentication
- private key
- security services
- information systems
- security mechanisms
- formal methods
- elliptic curve cryptography
- cost effective