, See supplementary files attached to this report
, 5G PPP phase 1 security landscape, 5G-PPP White-Paper Phase-1-Security-Landscape, 2017.
Mobile values, new names, and secure communication, Conference Record of POPL 2001: The 28th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp.104-115, 2001. ,
URL : https://hal.archives-ouvertes.fr/hal-01423924
Analysing unlinkability and anonymity using the applied pi calculus, Proceedings of the 23rd IEEE Computer Security Foundations Symposium, CSF 2010, pp.107-121, 2010. ,
New privacy issues in mobile telephony: fix and verification, the ACM Conference on Computer and Communications Security, CCS'12, pp.205-216, 2012. ,
StatVerif: Verification of stateful processes, Journal of Computer Security, vol.22, issue.5, pp.743-821, 2014. ,
The AVANTSSAR platform for the automated validation of trust and security of service-oriented architectures, Tools and Algorithms for the Construction and Analysis of Systems -18th International Conference, TACAS 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software, vol.2012, pp.267-282, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00759725
Automated symbolic proofs of observational equivalence, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp.1144-1155, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01337409
An efficient cryptographic protocol verifier based on prolog rules, 14th IEEE Computer Security Foundations Workshop, pp.82-96, 2001. ,
Automated verification of selected equivalences for security protocols, J. Log. Algebr. Program, vol.75, issue.1, pp.3-51, 2008. ,
New privacy threat on 3G, 4G, and upcoming 5G AKA protocols, PoPETs, vol.2019, issue.3, pp.108-127, 2019. ,
URL : https://hal.archives-ouvertes.fr/hal-02368896
Set-Pi: Set membership p-calculus, IEEE 28th Computer Security Foundations Symposium, pp.185-198, 2015. ,
Formal verification of privacy for RFID systems, Proceedings of the 23rd IEEE Computer Security Foundations Symposium, CSF 2010, pp.75-88, 2010. ,
Revised Selected Papers, ser. Lecture Notes in Computer Science, Trustworthy Global Computing -7th International Symposium, TGC 2012, vol.8191, pp.129-144, 2012. ,
A little more conversation, a little less action, a lot more satisfaction: Global states in ProVerif, 31st IEEE Computer Security Foundations Symposium, pp.344-358, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01900088
The DEEPSEC prover, Computer Aided Verification -30th International Conference, CAV 2018, Held as Part of the Federated Logic Conference, FloC, vol.10982, pp.28-36, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01763138
Automated unbounded verification of stateful cryptographic protocols with exclusive or, 31st IEEE Computer Security Foundations Symposium, pp.359-373, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01780603
Achieving better privacy for the 3GPP AKA protocol, PoPETs, vol.2016, issue.4, pp.255-275, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01510801
A method for unbounded verification of privacy-type properties, Journal of Computer Security, vol.27, issue.3, pp.277-342, 2019. ,
URL : https://hal.archives-ouvertes.fr/hal-02368832
, ISO 15408-2: Common criteria for information technology security evaluation -part 2: Security functional components, 2009.
Defining strong privacy for RFID, ACM Trans. Inf. Syst. Secur, vol.13, issue.1, pp.1-7, 2009. ,
The 5G-AKA authentication protocol privacy, IEEE European Symposium on Security and Privacy, vol.2019, pp.464-479, 2019. ,
Automated analysis of security protocols with global state, Journal of Computer Security, vol.24, issue.5, pp.583-616, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01091241
The TAMARIN prover for the symbolic analysis of security protocols, Computer Aided Verification -25th International Conference, CAV 2013, pp.696-701, 2013. ,
AIF-?: Set-based protocol abstraction with countable families, Principles of Security and Trust -5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, vol.9635, pp.233-253, 2016. ,
Alpha-beta privacy, ACM Trans. Priv. Secur, vol.22, issue.1, pp.1-7, 2019. ,
Cryptographic approach to "privacy-friendly" tags, RFID privacy workshop, vol.82, 2003. ,
Researchers see privacy pitfalls in no-swipe credit cards, New York Times ,
Chair for Communication Security, Ruhr-Universität Bochum, vol.14, 2007. ,
Smart Devices, Convergence and Next Generation Networks, Second IFIP WG 11.2 International Workshop, Information Security Theory and Practices, vol.5019, pp.1-15, 2008. ,
Attacks on RFID protocols, IACR Cryptology ePrint Archive, p.310, 2008. ,
On privacy models for RFID, 13th International Conference on the Theory and Application of Cryptology and Information Security, vol.4833, pp.68-87, 2007. ,