با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد).
ردیف | عنوان | نوع |
---|---|---|
1 |
Formalizing and analyzing security ceremonies with heterogeneous devices in ANP and PDL
رسمیت و تجزیه و تحلیل مراسم امنیتی با دستگاههای ناهمگن در ANP و PDL-2021 In today’s security protocols (also called “security ceremonies” when humans play a key role), different nodes may have different capabilities: computers can encrypt and decrypt messages, whereas humans cannot; a biometric device can capture biometric information, whereas a random number generator used in e-banking cannot; and so on. Furthermore, even if a node has the decryption capability, it must also know the encryption key to decrypt a message. Actor-network procedures (ANPs) are a well-known formal model of heterogeneous security protocols by Meadows and Pavlovic, and their procedure derivation logic (PDL) supports the logical reasoning about ANPs. However, ANPs do not support explicitly specifying node capabilities, and PDL does not support reasoning explicitly about the knowledge of the participants at different points in time. In this paper, we extend ANPs to deal with heterogeneous devices by explicitly specifying the nodes’ capabilities, as well as by adding new types of events. We also modify PDL to take into account the knowledge of participants at different points in time, and extend PDL to reason both from a “bird’s- eye” view of the system, as well from a “node’s-eye” view. All this allows us to reason about secrecy and authentication in security protocols/ceremonies with different kinds of devices and human users. We illustrate the use of our modeling notation ANP-C and our logics PDL-CK and PDL-CKL to specify and reason about a number of scenarios involving different kinds of devices, including: scenarios for updating someone’s data in a smart card reader; an SSL/TLS ceremony involving a user, a smartphone with a fingerprint reader, anda remote computer/server; and scenarios involving the YubiKey authentication device used by companies such as Google, Facebook, and Bank of America. 2021 Elsevier Inc. All rights reserved. Keywords: Formal methods | Security protocols | Security ceremonies | Actor-network procedures | Procedure derivation logic | Authentication devices |
مقاله انگلیسی |
2 |
Secured miniaturized system-in-package contactless and passive authentication devices featuring NFC
سیستم امن مینیاتوری در بسته بدون تماس و احراز هویت دستگاه های غیر فعال دارای NFC-2017 RFID/NFC technology is widely spread nowadays and applications can be found in our everyday life, for
example, in payment, transportation, logistics, healthcare, and access control. State-of-the-art contactless
and passive authentication solutions implement relatively large coils outside of the chip. Therefore, the
minimum size is in the order of a few square centimeters, which limits their use for tagging of certain
small-sized goods. On top of that, those miniaturized solutions which are available today provide only
limited security measures.
Here we introduce miniaturized system-in-package contactless authentication devices. This novel solution
integrates Infineon Technologies’ CIPURSETMmove IC, which is a state-of-the-art security solution featur
ing an open security standard, into embedded Wafer Level Ball Grid Array (eWLB) packages, together
with HF-antennas, ferrites, as well as discrete elements that improve HF-coupling characteristics.
The presented devices provide better HF-coupling characteristics than Coil-on-Chip approaches, which
also enable verification of authenticity of tagged products through NFC-enabled smart phones. Thanks to
the miniaturized package sizes of 3 × 3 mm, integration into high-priced products, casings, consumable
materials, etc., can be achieved in a discreet way. Furthermore, the integrated CIPURSETM chip enables
not only the anti-counterfeiting use-case, but also micropayment, ticketing, access control, and password
storage in a secured way. Therefore, this miniaturized contactless authentication solution will open up
whole new fields of applications.
Keywords: Security | System-in-package | eWLB | RFID | NFC | CIPURSETM |
مقاله انگلیسی |