Zobrazeno 1 - 10
of 60
pro vyhledávání: '"Tom Chothia"'
Autor:
Mohammad Mahdi Jaghoori, Tom Chothia
Publikováno v:
Electronic Proceedings in Theoretical Computer Science, Vol 30, Iss Proc. FOCLASA 2010, Pp 108-122 (2010)
We give a real-time semantics for the concurrent, object-oriented modeling language Creol, by mapping Creol processes to a network of timed automata. We can use our semantics to verify real time properties of Creol objects, in particular to see wheth
Externí odkaz:
https://doaj.org/article/61ad3d087a0c4139b7985176d164cb27
Publikováno v:
Financial Cryptography and Data Security ISBN: 9783319709710
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::90b4d80a70c987b868d8a9f4d575f52b
https://doi.org/10.1007/978-3-319-70972-7_36
https://doi.org/10.1007/978-3-319-70972-7_36
Autor:
Tom Chothia, Richard J. Thomas
Publikováno v:
Cybersecurity in Transport Systems ISBN: 9781785616686
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::392965f3f5815ea999533aa4889cc088
https://doi.org/10.1049/pbtr015e_appendix1
https://doi.org/10.1049/pbtr015e_appendix1
Publikováno v:
2022 IEEE Symposium on Security and Privacy (SP).
Publikováno v:
CCS
CCS, Nov 2020, Virtual Conference, United States
CCS, Nov 2020, Virtual Conference, United States
International audience; Contactless systems, such as the EMV (Europay, Mastercard and Visa) payment protocol, are vulnerable to relay attacks. The typical countermeasure to this relies on so-called proximity checking or distance bounding protocols, w
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::54bd607d87aa93258e8b9a880b3d8a82
https://hal.inria.fr/hal-02917076
https://hal.inria.fr/hal-02917076
Autor:
Joshua Perrett, Richard J. Thomas, Tom Chothia, Emmanouil Samanis, Awais Rashid, Joseph Gardiner
Publikováno v:
CPSIOTSEC@CCS
Thomas, R, Gardiner, J, Chothia, T, Samanis, M, Rashid, A & Perrett, J 2020, Catch Me If You Can : An In-Depth Study of CVE Discovery Time and Inconsistencies for Managing Risks in Critical Infrastructures . in CPSIOTSEC'20 : Proceedings of the 2020 Joint Workshop on CPS &IoT Security and Privacy . Association for Computing Machinery (ACM), pp. 49-60, 2020 ACM SIGSAC Conference on Computer and Communications Security, 9/11/20 . https://doi.org/10.1145/3411498.3419970
Thomas, R, Gardiner, J, Chothia, T, Samanis, M, Rashid, A & Perrett, J 2020, Catch Me If You Can : An In-Depth Study of CVE Discovery Time and Inconsistencies for Managing Risks in Critical Infrastructures . in CPSIOTSEC'20 : Proceedings of the 2020 Joint Workshop on CPS &IoT Security and Privacy . Association for Computing Machinery (ACM), pp. 49-60, 2020 ACM SIGSAC Conference on Computer and Communications Security, 9/11/20 . https://doi.org/10.1145/3411498.3419970
Industrial Control Systems (ICS) are central to the operation of critical national infrastructure (CNI) such as oil and gas, water treatment, power generation and transport systems. Effective risk management to mitigate large-scale disruption to soci
Publikováno v:
Security and Trust Management ISBN: 9783030598167
STM
Security and Trust Management-16th International Workshop, STM 2020, Guildford, UK, September 17–18, 2020, Proceedings
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Security and Trust Management
STM
Security and Trust Management-16th International Workshop, STM 2020, Guildford, UK, September 17–18, 2020, Proceedings
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Security and Trust Management
The IEEE 802.11 standard defines a 4-way handshake between a supplicant and an authenticator for secure communication. Many attacks such as KRACK, cipher downgrades, and key recovery attacks have been recently discovered against it. These attacks rai
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::a0f112e0a4c6c9cf00885de2697a4814
https://doi.org/10.1007/978-3-030-59817-4_1
https://doi.org/10.1007/978-3-030-59817-4_1
Publikováno v:
Financial Cryptography and Data Security ISBN: 9783030321000
Financial Cryptography
Financial Cryptography
It is possible to relay signals between a contactless EMV card and a shop’s EMV reader and so make a fraudulent payment without the card-owner’s knowledge. Existing countermeasures rely on proximity checking: the reader will measure round trip ti
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7a42e766980282fc83b0860759906a8c
https://doi.org/10.1007/978-3-030-32101-7_14
https://doi.org/10.1007/978-3-030-32101-7_14
Publikováno v:
Smart Card Research and Advanced Applications ISBN: 9783030154615
CARDIS
CARDIS
In this paper, we systematically review and categorize different hardware-based firmware extraction techniques, using 24 examples of real, wide-spread products, e.g. smart voice assistants (in particular Amazon Echo devices), alarm and access control
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::9c0981d627c90c0ff184aea6ef2827c7
https://doi.org/10.1007/978-3-030-15462-2_12
https://doi.org/10.1007/978-3-030-15462-2_12
Publikováno v:
Transactions on Edutainment XV ISBN: 9783662593509
Narrative is an important element of gamification. In this article, we describe the development of a framework that adds a narrative to an 11-week cybersecurity course. The students play the part of a new IT security employee at a company and are ask
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a79700e3d03cdff11e7a5fea4be151e7
https://doi.org/10.1007/978-3-662-59351-6_12
https://doi.org/10.1007/978-3-662-59351-6_12