Part 4: VerificationInternational audienceSecurity ceremonies extend cryptographic protocols with models of human users to allow us to take human behaviors into account when reasoning about security. Actor-network procedures (ANPs) are a well-known formal model of security ceremonies, and procedure derivation logic (PDL) allows us to reason logically about ANPs. In a security ceremony, different nodes may have different capabilities: computers can encrypt and decrypt messages, whereas humans cannot; a biometric device can capture biometric information, whereas a random number generator used in e-banking cannot; and so on. Furthermore, even if a node has the decryption capability, it must also know the encryption key to decrypt a message. AN...
Presented on March 10, 2017 at 12:00 p.m. in t he Klaus Advanced Computer Building, Room 1116W.Shan ...
As distributed computing becomes increasingly prevalent, driving a demand for security and privacy i...
The increasing heterogeneity of communicating devices, ranging from resource constrained battery dri...
In this paper we propose actor-networks as a formal model of computation in heterogenous networks of...
In this paper we propose actor-networks as a formal model of computation in heterogenous networks of...
Part 7: Social Networks and Social EngineeringInternational audienceA security ceremony expands a se...
A security ceremony expands a security protocol with everything that is considered out of band for i...
Phishing takes advantage of the way humans interact with computers or interpret messages. A security...
Abstract. We are interested in formal modelling and verification of se-curity ceremonies. Considerab...
We blend research from human-computer interface\ud (HCI) design with computational based crypto-\ud ...
We propose a formal model to analyze security protocols with human interaction. We model humans with...
International audienceSecurity protocols are the small distributed programs which are omnipresent in...
Establishing a secure communication channel between two parties is a nontrivial problem, especially ...
International audienceSecurity protocols are short programs aiming at securing communications over a...
The actor network procedures of Pavlovic and Meadows are a recent graphical formalism developed for ...
Presented on March 10, 2017 at 12:00 p.m. in t he Klaus Advanced Computer Building, Room 1116W.Shan ...
As distributed computing becomes increasingly prevalent, driving a demand for security and privacy i...
The increasing heterogeneity of communicating devices, ranging from resource constrained battery dri...
In this paper we propose actor-networks as a formal model of computation in heterogenous networks of...
In this paper we propose actor-networks as a formal model of computation in heterogenous networks of...
Part 7: Social Networks and Social EngineeringInternational audienceA security ceremony expands a se...
A security ceremony expands a security protocol with everything that is considered out of band for i...
Phishing takes advantage of the way humans interact with computers or interpret messages. A security...
Abstract. We are interested in formal modelling and verification of se-curity ceremonies. Considerab...
We blend research from human-computer interface\ud (HCI) design with computational based crypto-\ud ...
We propose a formal model to analyze security protocols with human interaction. We model humans with...
International audienceSecurity protocols are the small distributed programs which are omnipresent in...
Establishing a secure communication channel between two parties is a nontrivial problem, especially ...
International audienceSecurity protocols are short programs aiming at securing communications over a...
The actor network procedures of Pavlovic and Meadows are a recent graphical formalism developed for ...
Presented on March 10, 2017 at 12:00 p.m. in t he Klaus Advanced Computer Building, Room 1116W.Shan ...
As distributed computing becomes increasingly prevalent, driving a demand for security and privacy i...
The increasing heterogeneity of communicating devices, ranging from resource constrained battery dri...