Although verifying a message has long been recognized as an important concept, which has been used explicitly or implicitly in security protocol analysis, there is no consensus on its exact meaning. Such a lack of formal treatment of the concept makes it extremely difficult to evaluate the vulnerability of security protocols. This dissertation offers a precise answer to the question: What is meant by saying that a message can be "verified''? The core technical innovation is a third notion of knowledge in security protocols -- recognizability. It can be considered as intermediate between deduction and static equivalence, two classical knowledge notions in security protocols. We believe that the notion of recognizability sheds important light...
Security protocols aim to allow secure electronic communication despite the potential presence of ea...
International audienceWe address the proof-based development of cryptographic protocols satisfying s...
International audienceSecurity protocols are short programs that aim at securing communication over ...
This paper describes a new interactive method to analyse knowledge of participants involved in secur...
AbstractIn [19], the authors presented a type-theoretic approach to the verification of security pro...
AbstractThe analysis of security protocols requires precise formulations of the knowledge of protoco...
When designing a cryptographic protocol or explaining it, one often uses arguments such as “since th...
Abstract—Many security protocols are vulnerable to type flaw attacks, in which a protocol message ma...
We report on work-in-progress on a new semantics for analyzing security protocols that combines comp...
AbstractWe propose a notion of information based abstraction for the logical study of security proto...
We report on work-in-progress on a new semantics for analyzing security protocols that combines comp...
Communication Protocols form a fundamental backbone of our modern information networks. These protoc...
Communication Protocols form a fundamental backbone of our modern information networks. These protoc...
AbstractWe report on work-in-progress on a new semantics for analyzing security protocols that combi...
Cryptographic protocols form the backbone of our digital society. Unfortunately, the security of num...
Security protocols aim to allow secure electronic communication despite the potential presence of ea...
International audienceWe address the proof-based development of cryptographic protocols satisfying s...
International audienceSecurity protocols are short programs that aim at securing communication over ...
This paper describes a new interactive method to analyse knowledge of participants involved in secur...
AbstractIn [19], the authors presented a type-theoretic approach to the verification of security pro...
AbstractThe analysis of security protocols requires precise formulations of the knowledge of protoco...
When designing a cryptographic protocol or explaining it, one often uses arguments such as “since th...
Abstract—Many security protocols are vulnerable to type flaw attacks, in which a protocol message ma...
We report on work-in-progress on a new semantics for analyzing security protocols that combines comp...
AbstractWe propose a notion of information based abstraction for the logical study of security proto...
We report on work-in-progress on a new semantics for analyzing security protocols that combines comp...
Communication Protocols form a fundamental backbone of our modern information networks. These protoc...
Communication Protocols form a fundamental backbone of our modern information networks. These protoc...
AbstractWe report on work-in-progress on a new semantics for analyzing security protocols that combi...
Cryptographic protocols form the backbone of our digital society. Unfortunately, the security of num...
Security protocols aim to allow secure electronic communication despite the potential presence of ea...
International audienceWe address the proof-based development of cryptographic protocols satisfying s...
International audienceSecurity protocols are short programs that aim at securing communication over ...