Abstract | ||
---|---|---|
When using formal methods, security protocols are usually modeled at a high level of abstraction. In particular, data encoding and decoding transformations are often abstracted away. However, if no assumptions at all are made on the behavior of such transformations, they could trivially lead to security faults, for example leaking secrets or breaking freshness by collapsing nonces into constants. |
Year | DOI | Venue |
---|---|---|
2014 | 10.1007/s00165-012-0267-y | Formal Asp. Comput. |
Keywords | Field | DocType |
Model abstraction, Refinement, Security protocols | Data encoding,Abstraction,Cryptographic protocol,Computer science,Theoretical computer science,Decoding methods,Formal methods,Computer security model,Cryptographic nonce | Journal |
Volume | Issue | ISSN |
26 | 1 | 1433-299X |
Citations | PageRank | References |
2 | 0.36 | 20 |
Authors | ||
2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Alfredo Pironti | 1 | 330 | 27.47 |
Riccardo Sisto | 2 | 556 | 56.79 |