{"id":"https://openalex.org/W2493553945","doi":"https://doi.org/10.1007/978-3-319-33951-1_4","title":"A Formal Security Analysis of ERTMS Train to Trackside Protocols","display_name":"A Formal Security Analysis of ERTMS Train to Trackside Protocols","publication_year":2016,"publication_date":"2016-01-01","ids":{"openalex":"https://openalex.org/W2493553945","doi":"https://doi.org/10.1007/978-3-319-33951-1_4","mag":"2493553945"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-319-33951-1_4","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-33951-1_4","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://research.birmingham.ac.uk/en/publications/5ca4d294-1106-49f1-83d2-8137c8d4b969","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5028584606","display_name":"Joeri de Ruiter","orcid":"https://orcid.org/0000-0003-1535-2335"},"institutions":[{"id":"https://openalex.org/I79619799","display_name":"University of Birmingham","ror":"https://ror.org/03angcq70","country_code":"GB","type":"education","lineage":["https://openalex.org/I79619799"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Joeri de Ruiter","raw_affiliation_strings":["School of Computer Science, University of Birmingham, Birmingham, UK"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, University of Birmingham, Birmingham, UK","institution_ids":["https://openalex.org/I79619799"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088453297","display_name":"Richard J. Thomas","orcid":"https://orcid.org/0000-0002-7199-1265"},"institutions":[{"id":"https://openalex.org/I79619799","display_name":"University of Birmingham","ror":"https://ror.org/03angcq70","country_code":"GB","type":"education","lineage":["https://openalex.org/I79619799"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Richard J. Thomas","raw_affiliation_strings":["School of Computer Science, University of Birmingham, Birmingham, UK"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, University of Birmingham, Birmingham, UK","institution_ids":["https://openalex.org/I79619799"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5020004082","display_name":"Tom Chothia","orcid":"https://orcid.org/0000-0002-9381-1368"},"institutions":[{"id":"https://openalex.org/I79619799","display_name":"University of Birmingham","ror":"https://ror.org/03angcq70","country_code":"GB","type":"education","lineage":["https://openalex.org/I79619799"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Tom Chothia","raw_affiliation_strings":["School of Computer Science, University of Birmingham, Birmingham, UK"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, University of Birmingham, Birmingham, UK","institution_ids":["https://openalex.org/I79619799"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5028584606"],"corresponding_institution_ids":["https://openalex.org/I79619799"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":1.8828,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.85159209,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"53","last_page":"68"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13999","display_name":"Digital Rights Management and Security","score":0.9532999992370605,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8564330339431763},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.6262915730476379},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.612415611743927},{"id":"https://openalex.org/keywords/timestamp","display_name":"Timestamp","score":0.5552670955657959},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.5421477556228638},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5405160188674927},{"id":"https://openalex.org/keywords/replay-attack","display_name":"Replay attack","score":0.5100077390670776},{"id":"https://openalex.org/keywords/formal-methods","display_name":"Formal methods","score":0.4758469760417938},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.46913525462150574},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.28543245792388916},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.1908627450466156},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.17517149448394775}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8564330339431763},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.6262915730476379},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.612415611743927},{"id":"https://openalex.org/C113954288","wikidata":"https://www.wikidata.org/wiki/Q186885","display_name":"Timestamp","level":2,"score":0.5552670955657959},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.5421477556228638},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5405160188674927},{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.5100077390670776},{"id":"https://openalex.org/C75606506","wikidata":"https://www.wikidata.org/wiki/Q1049183","display_name":"Formal methods","level":2,"score":0.4758469760417938},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.46913525462150574},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.28543245792388916},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.1908627450466156},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.17517149448394775},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":5,"locations":[{"id":"doi:10.1007/978-3-319-33951-1_4","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-33951-1_4","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:pure.atira.dk:Publications/5ca4d294-1106-49f1-83d2-8137c8d4b969","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306402634","display_name":"University of Birmingham Research Portal (University of Birmingham)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79619799","host_organization_name":"University of Birmingham","host_organization_lineage":["https://openalex.org/I79619799"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""},{"id":"pmh:oai:pure.atira.dk:openaire_cris_publications/5ca4d294-1106-49f1-83d2-8137c8d4b969","is_oa":true,"landing_page_url":"https://research.birmingham.ac.uk/en/publications/5ca4d294-1106-49f1-83d2-8137c8d4b969","pdf_url":null,"source":{"id":"https://openalex.org/S4306402634","display_name":"University of Birmingham Research Portal (University of Birmingham)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79619799","host_organization_name":"University of Birmingham","host_organization_lineage":["https://openalex.org/I79619799"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Chothia, T, De Ruiter, J & Thomas, R J 2016, A Formal Security Analysis of ERTMS Train to Trackside Protocols. in Reliability, Safety, and Security of Railway Systems. Modelling, Analysis, Verification, and Certification., Chapter 4, Lecture Notes in Computer Science, vol. 9707, Springer, pp. 53-68, RSSRail 2016, First International Conference, Paris, France, 28/06/16. https://doi.org/10.1007/978-3-319-33951-1_4","raw_type":"contributionToPeriodical"},{"id":"pmh:oai:pure.atira.dk:publications/5ca4d294-1106-49f1-83d2-8137c8d4b969","is_oa":false,"landing_page_url":"https://research.birmingham.ac.uk/portal/en/publications/a-formal-security-analysis-of-ertms-train-to-trackside-protocols(5ca4d294-1106-49f1-83d2-8137c8d4b969).html","pdf_url":null,"source":{"id":"https://openalex.org/S4306402634","display_name":"University of Birmingham Research Portal (University of Birmingham)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79619799","host_organization_name":"University of Birmingham","host_organization_lineage":["https://openalex.org/I79619799"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""},{"id":"pmh:oai:repository.ubn.ru.nl:2066/161279","is_oa":false,"landing_page_url":"http://hdl.handle.net/2066/161279","pdf_url":null,"source":{"id":"https://openalex.org/S4306401067","display_name":"Radboud Repository (Radboud University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I145872427","host_organization_name":"Radboud University Nijmegen","host_organization_lineage":["https://openalex.org/I145872427"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Lecomte, T. (ed.), Reliability, Safety, and Security of Railway Systems. Modelling, Analysis, Verification, and Certification: First International Conference, RSSRail 2016, Paris, France, June 28-30, 2016, Proceedings, pp. 53-68","raw_type":"Article in monograph or in proceedings"}],"best_oa_location":{"id":"pmh:oai:pure.atira.dk:openaire_cris_publications/5ca4d294-1106-49f1-83d2-8137c8d4b969","is_oa":true,"landing_page_url":"https://research.birmingham.ac.uk/en/publications/5ca4d294-1106-49f1-83d2-8137c8d4b969","pdf_url":null,"source":{"id":"https://openalex.org/S4306402634","display_name":"University of Birmingham Research Portal (University of Birmingham)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79619799","host_organization_name":"University of Birmingham","host_organization_lineage":["https://openalex.org/I79619799"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Chothia, T, De Ruiter, J & Thomas, R J 2016, A Formal Security Analysis of ERTMS Train to Trackside Protocols. in Reliability, Safety, and Security of Railway Systems. Modelling, Analysis, Verification, and Certification., Chapter 4, Lecture Notes in Computer Science, vol. 9707, Springer, pp. 53-68, RSSRail 2016, First International Conference, Paris, France, 28/06/16. https://doi.org/10.1007/978-3-319-33951-1_4","raw_type":"contributionToPeriodical"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1208334278","display_name":null,"funder_award_id":"EP/L001802/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G2203431522","display_name":null,"funder_award_id":"EP/M002845/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"}],"funders":[{"id":"https://openalex.org/F4320334627","display_name":"Engineering and Physical Sciences Research Council","ror":"https://ror.org/0439y7842"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W1010687637","https://openalex.org/W1918535139","https://openalex.org/W1973054120","https://openalex.org/W2110481971","https://openalex.org/W2114189125","https://openalex.org/W2167816957","https://openalex.org/W2181572248","https://openalex.org/W2204535006","https://openalex.org/W2621463603","https://openalex.org/W3142572285","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W1997952192","https://openalex.org/W2103114700","https://openalex.org/W2992243556","https://openalex.org/W3040218957","https://openalex.org/W2896383829","https://openalex.org/W3111733712","https://openalex.org/W1512010809","https://openalex.org/W2347425392","https://openalex.org/W3126703321","https://openalex.org/W2109952796"],"abstract_inverted_index":null,"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-08-23T00:00:00"}
