References of "van Deursen, Ton 40000692"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailInsider Attacks and Privacy of RFID Protocols
van Deursen, Ton UL; Radomirovic, Sasa UL

in EuroPKI 2011 (2012)

Detailed reference viewed: 96 (2 UL)
Full Text
See detailSecurity of RFID protocols
Van Deursen, Ton UL

Doctoral thesis (2011)

Radio-frequency identification (RFID) is a technology that uses radio waves to exchange data between RFID readers and tags. The low manufacturing costs and small size and the lack of need of a power ... [more ▼]

Radio-frequency identification (RFID) is a technology that uses radio waves to exchange data between RFID readers and tags. The low manufacturing costs and small size and the lack of need of a power source make RFID tags useful in many applications, but also impose a strong need for secure RFID protocols. The first part of this thesis considers the analysis of untraceability of RFID protocols. We start by designing a formal syntax and semantics for security protocols. We define untraceability as a property on the traces of a protocol. We find new untraceability flaws in a number of RFID protocols. Furthermore, we show that indistinguishability-based proof models are incomparable to unpredictability-based proof models. The second part of this thesis is concerned with authentication of RFID protocols. Authentication ensures that agents can not be impersonated. We categorize new authentication attacks into algebraic replay attacks, man-in-the-middle attacks, compositionality attacks, and cryptanalytic attacks. The third part of this thesis deals with formalizing ownership in RFID systems and related security properties. In dynamic environments where RFID tags are exchanged, sold, or traded, the owner of a tag may change. We define secure ownership, exclusive ownership, secure ownership transfer, and desynchronization resistance. The fourth part of this thesis describes the problem of recovering memory structures of systems. We define the carving problem as recovering the structure of the memory, based on an attributed dump set. We design and implement algorithms to find commonalities and dissimilarities and apply them to a deployed RFID system.   [less ▲]

Detailed reference viewed: 94 (4 UL)
Full Text
Peer Reviewed
See detail50 Ways to Break RFID Privacy
van Deursen, Ton UL

in Privacy and Identity Management for Life (2011), 352

Detailed reference viewed: 68 (0 UL)
Full Text
Peer Reviewed
See detailmCarve: Carving attributed dump sets
van Deursen, Ton UL; Mauw, Sjouke UL; Radomirovic, Sasa UL

in Abstract book of 20th USENIX Security Symposium (2011)

Detailed reference viewed: 40 (1 UL)
Full Text
Peer Reviewed
See detailEC-RAC: Enriching a Capacious RFID Attack Collection
van Deursen, Ton UL; Radomirovic, Sasa UL

in 6th Workshop on RFID Security (RFIDSec 2010) (2010)

Detailed reference viewed: 85 (0 UL)
Full Text
Peer Reviewed
See detailImproving automatic verification of security protocols with XOR
Chen, Xihui UL; van Deursen, Ton UL; Pang, Jun UL

in Proc. 11th International Conference on Formal Engineering Methods (2009)

Detailed reference viewed: 134 (2 UL)
Full Text
Peer Reviewed
See detailSecure ownership and ownership transfer in RFID systems
van Deursen, Ton UL; Mauw, Sjouke UL; Radomirovic, Sasa UL et al

in Proc. 14th European Symposium On Research In Computer Security (ESORICS'09) (2009)

Detailed reference viewed: 100 (0 UL)
Full Text
Peer Reviewed
See detailOn a new formal proof model for RFID location privacy
van Deursen, Ton UL; Radomirovic, Sasa UL

in Information Processing Letters (2009), 110(2), 57-61

Detailed reference viewed: 90 (0 UL)
Full Text
Peer Reviewed
See detailAlgebraic attacks on RFID protocols
van Deursen, Ton UL; Radomirovic, Sasa UL

in Third IFIP WG 11.2 International Workshop (2009)

Detailed reference viewed: 89 (0 UL)
Full Text
Peer Reviewed
See detailSecurity of RFID protocols - A case study
van Deursen, Ton UL; Radomirovic, Sasa UL

in Electronic Notes in Theoretical Computer Science (2009), 244

Detailed reference viewed: 107 (1 UL)
Full Text
Peer Reviewed
See detailReliable Personal Health Records
van Deursen, Ton UL; Koster, Paul; Petković, Milan

in eHealth Beyond the Horizon – Get IT There – Proceedings of MIE2008 – The XXIst International Congress on the European Federation for Medical Informatics (2008)

Detailed reference viewed: 31 (0 UL)
Full Text
Peer Reviewed
See detailUntraceability of RFID Protocols
van Deursen, Ton UL; Mauw, Sjouke UL; Radomirovic, Sasa UL

in Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks (2008)

Detailed reference viewed: 105 (0 UL)
Peer Reviewed
See detailSecurity of an RFID Protocol for Supply Chains
van Deursen, Ton UL; Radomirovic, Sasa UL

in Proceedings of the 1st Workshop on Advances in RFID, AIR'08 (2008)

Detailed reference viewed: 105 (1 UL)
Full Text
Peer Reviewed
See detailHedaquin: A reputation-based health data quality indicator
van Deursen, Ton UL; Koster, Paul; Petkovic, Milan

in Electronic Notes in Theoretical Computer Science (2008), 1997(2), 159-167

Detailed reference viewed: 86 (1 UL)