While extensive research addresses the problem of establish-ing session keys through cryptographic protocols, relatively little work has appeared addressing the problem of revoca-tion and update of long term keys. We present an API for symmetric key management on embedded devices that sup-ports key establishment and revocation, and prove security properties of our design in the symbolic model of cryptogra-phy. Our API supports two modes of revocation: a passive mode where keys have an expiration time, and an active mode where revocation messages are sent to devices. For the first we show that once enough time has elapsed after the compromise of a key, the system returns to a secure state, i.e. the API is robust against attempts by the at-ta...
Assistive environments employ multiple types of devices to monitor human actions and identify critic...
User revocation is one of the main security issues in publish and subscribe (pub/sub) systems. Inde...
PKCS#11 is a standard API to cryptographic devices such as smarcards, hardware security modules and ...
While extensive research addresses the problem of establish-ing session keys through cryptographic p...
International audienceWhile extensive research addresses the problem of establishing session keys th...
We present the design of a new symmetric key management API for cryptographic devices intended to im...
We consider the problem of efficient key management and user revocation in cryptographic file system...
A general method is described for formally specifying and reasoning about distributed systems with a...
Electronic signatures replace handwritten signatures in electronic processes. In this context, non-r...
Abstract A crucial element of distributed cryptographic file systems are key management solutions th...
Abstract. The combination of software-as-a-service and the increasing use of mobile devices gives ri...
Establishing a session key (SSK) is very important for real-world deployment in open networks, which...
We consider the problem of efficient key management and user revocation in cryptographic file system...
In this paper, we present a scalable and secure protocol for key revocation in wireless sensor netwo...
Assistive environments employ multiple types of devices to monitor human actions and identify critic...
User revocation is one of the main security issues in publish and subscribe (pub/sub) systems. Inde...
PKCS#11 is a standard API to cryptographic devices such as smarcards, hardware security modules and ...
While extensive research addresses the problem of establish-ing session keys through cryptographic p...
International audienceWhile extensive research addresses the problem of establishing session keys th...
We present the design of a new symmetric key management API for cryptographic devices intended to im...
We consider the problem of efficient key management and user revocation in cryptographic file system...
A general method is described for formally specifying and reasoning about distributed systems with a...
Electronic signatures replace handwritten signatures in electronic processes. In this context, non-r...
Abstract A crucial element of distributed cryptographic file systems are key management solutions th...
Abstract. The combination of software-as-a-service and the increasing use of mobile devices gives ri...
Establishing a session key (SSK) is very important for real-world deployment in open networks, which...
We consider the problem of efficient key management and user revocation in cryptographic file system...
In this paper, we present a scalable and secure protocol for key revocation in wireless sensor netwo...
Assistive environments employ multiple types of devices to monitor human actions and identify critic...
User revocation is one of the main security issues in publish and subscribe (pub/sub) systems. Inde...
PKCS#11 is a standard API to cryptographic devices such as smarcards, hardware security modules and ...