Security Protocol Design
Currently, there are a number of secure channel protocols that do not take into account the specific characteristics (e.g. processing overheads, communication buffers, etc.) of the underlying technology utilised by different devices. We have proposed, in the following papers [95, 100] a number of secure channel protocols that were designed specifically by taking into account all these factors.
A Fair and Anonymous E-commerce Scheme based on Compatible Keys and Digital Coins. A Fair and Anonymous E-commerce Scheme based on Compatible Keys and Digital Coins. Springer-Verlag (2007).
: Optimistic Fair-Exchange with Anonymity for Bitcoin Users. To appear in the 11th IEEE International Conference on e-Business Engineering (IEEE ICEBE-14). IEEE Computer Society, Guangzhou, China (2014).Abstract
: Secure Mobile Payment on NFC-Enabled Mobile Phones Formally Analysed Using CasperFDR. Trust, Security and Privacy in Computing and Communications (TrustCom), 2014 13th IEEE International Conference on. IEEE Computer Society (2014).Abstract
: A Mutual Authentication Protocol for Low-Cost RFID Tags Formally Verified Using CasperFDR and AVISPA. The 5th International Workshop on RFID Security and Cryptography 2013 (RISC’13), Internet Technology and Secured Transactions. 50-55 (2013).Abstract
: A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags. In: The 25th IFIP International Information Security Conference (SEC 2013). p. 102-110. Springer Berlin Heidelberg, Auckland, New Zealand (2013).Abstract
: An Asymmetric Cryptography Secure Channel Protocol for Smart Cards. In: Security and Protection in Information Processing Systems. p. 350-365. Springer US, Toulouse, France (2004). WebsiteAbstract
: A Secure Channel Protocol for Multi-Application Smart Cards Based on Public Key Cryptography. In: Communications and Multimedia Security. p. 79-95. Springer US (2004). WebsiteAbstract
: An architecture of audit logging in a multiapplication smart card environment. EICAR’99 E-Commerce and New Media Managing Safety and Malware Challenges Effectively. (1999).
: Secure Log File Download Mechanisms for Smart Cards. In: Smart Card Research and Applications. p. 285-304. Springer Berlin Heidelberg, UCL Louvain-La-Neuve-Belgium (2000). WebsiteAbstract
: Boundary Conditions that Influence Decisions about Log File Formats in Multi-application Smart Cards. In: Information and Communication Security. p. 230-243. Springer Berlin Heidelberg, Sydney, Australia (1999). WebsiteAbstract
: A Privacy Preserving Application Acquisition Protocol. In: 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom’12). p. 383-392. IEEE Computer Society, Liverpool, United Kingdom (2012).Abstract
: Application-Binding Protocol in the User Centric Smart Card Ownership Model. In: The 16th Australasian Conference on Information Security and Privacy (ACISP). p. 208-225. Springer Berlin Heidelberg, Melbourne, Australia (2011).Abstract
: