Abstract. Security protocols aim at securing communications over pub-lic networks. Their design is notoriously difficult and error-prone. Formal methods have shown their usefulness for providing a careful security anal-ysis in the case of standard authentication and confidentiality protocols. However, most current techniques do not apply to protocols that per-form recursive computation e.g. on a list of messages received from the network. While considering general recursive input/output actions very quickly yields undecidability, we focus on protocols that perform recursive tests on received messages but output messages that depend on the inputs in a standard way. This is in particular the case of secured routing proto-cols, distributed rig...
Security protocols are short programs that aim at securing communication over a public network. Thei...
As distributed computing becomes increasingly prevalent, driving a demand for security and privacy i...
A security protocol is a distributed program that might be executed on a network controlled by an ad...
International audienceSecurity protocols aim at securing communications over public networks. Their ...
In many security protocols, such as group protocols, principals have to perform iterative or recursi...
Abstract. Many decidability results are known for non-recursive cryptographic protocols, where the p...
Cryptographic protocols can be divided into (1) protocols where the protocol steps are simple from a...
kiel.de Truderung’s selecting theory model is one of the few models of cryptographic protocols which...
AbstractCryptographic protocols can be divided into (1) protocols where the protocol steps are simpl...
Colloque avec actes et comité de lecture. internationale.International audienceWe show that deciding...
International audienceSecurity protocols are short programs aiming at securing communications over a...
Authentication and secrecy have been widely investigated in security protocols. They are closely rel...
Cette thèse traite de la vérification des protocoles cryptographiques. Son sujet est la modélisation...
Consider the class of protocols, for two participants, in which the initiator applies a sequence of ...
AbstractMany cryptographic protocols and attacks on these protocols make use of the fact that the or...
Security protocols are short programs that aim at securing communication over a public network. Thei...
As distributed computing becomes increasingly prevalent, driving a demand for security and privacy i...
A security protocol is a distributed program that might be executed on a network controlled by an ad...
International audienceSecurity protocols aim at securing communications over public networks. Their ...
In many security protocols, such as group protocols, principals have to perform iterative or recursi...
Abstract. Many decidability results are known for non-recursive cryptographic protocols, where the p...
Cryptographic protocols can be divided into (1) protocols where the protocol steps are simple from a...
kiel.de Truderung’s selecting theory model is one of the few models of cryptographic protocols which...
AbstractCryptographic protocols can be divided into (1) protocols where the protocol steps are simpl...
Colloque avec actes et comité de lecture. internationale.International audienceWe show that deciding...
International audienceSecurity protocols are short programs aiming at securing communications over a...
Authentication and secrecy have been widely investigated in security protocols. They are closely rel...
Cette thèse traite de la vérification des protocoles cryptographiques. Son sujet est la modélisation...
Consider the class of protocols, for two participants, in which the initiator applies a sequence of ...
AbstractMany cryptographic protocols and attacks on these protocols make use of the fact that the or...
Security protocols are short programs that aim at securing communication over a public network. Thei...
As distributed computing becomes increasingly prevalent, driving a demand for security and privacy i...
A security protocol is a distributed program that might be executed on a network controlled by an ad...