Search Results for author: Helen Treharne

Found 1 papers, 0 papers with code

Formal Analysis of V2X Revocation Protocols

no code implementations24 Apr 2017 Jorden Whitefield, Liqun Chen, Frank Kargl, Andrew Paverd, Steve Schneider, Helen Treharne, Stephan Wesemeyer

This paper focusses on the formal analysis of a particular element of security mechanisms for V2X found in many proposals: the revocation of malicious or misbehaving vehicles from the V2X system by invalidating their credentials.

Cryptography and Security D.2.4; D.4.6

Cannot find the paper you are looking for? You can Submit a new open access paper.