Privacy protocols

J Castiglione, D Pavlovic, PM Seidel - Foundations of Security, Protocols …, 2019 - Springer
confidentiality, secrecy and privacy require that some undesirable information flows are
prevented: Alice’s password should be secret, her address should be confidentialcomposing her …

Secure composition of PKIs with public key protocols

V Cheval, V Cortier, B Warinschi - … IEEE 30th Computer Security …, 2017 - ieeexplore.ieee.org
secure PKI infrastructure P (as captured by some security property φPKI) can be safely used
by a protocol Q provided that Q is secure (preserve the secrecy … to model privacy properties […

Modeling and verifying security protocols with the applied pi calculus and ProVerif

B Blanchet - … and Trends® in Privacy and Security, 2016 - nowpublishers.com
… : secrecy and authentication. These are two basic properties required by most security
protocols… Observational equivalence provides compositional proofs: if a protocol P is equivalent to …

A communication gateway architecture for ensuring privacy and confidentiality in incident reporting

C Chatzigeorgiou, L Toumanidis… - 2017 IEEE 15th …, 2017 - ieeexplore.ieee.org
… SURBs), and bi-directional anonymity by composing the two mechanisms. This is achieved
by … PPPS and the CCS is always encrypted using the Transport Layer Security (TLS) protocol. …

Model checking security protocols

D Basin, C Cremers, C Meadows - Handbook of Model Checking, 2018 - Springer
… We write f n to denote the n-fold composition of f , for n ≥ 0, where f 0 is the identity function.
… that a protocol P ensures secrecy of t if and only all reachable states of P satisfy secrecy of t. …

[图书][B] Measurable and composable security, privacy, and dependability for cyberphysical systems: the SHIELD methodology

A Fiaschetti, J Noll, P Azzoni, R Uribeetxeberria - 2017 - books.google.com
… aspect by using composition techniques that are able to build a security … algorithms and
security protocols. On the contrary, … Confidentiality, integrity, and availability compose the core …

Automated verification for secure messaging protocols and their implementations: A symbolic and computational approach

N Kobeissi, K Bhargavan… - … on security and privacy  …, 2017 - ieeexplore.ieee.org
… , it is not an ideal language for writing security-critical applications. Its permissive, loose …
We define four confidentiality goals: • Secrecy If A sends some secret message M to B, then …

Privacy, discovery, and authentication for the internet of things

DJ Wu, A Taly, A Shankar, D Boneh - … on Research in Computer Security …, 2016 - Springer
… such as replay protection, ensuring perfect forward secrecy, and … proof of the security and
privacy of both protocols in the Canetti-… forward secrecy properties of this protocol in Sect. 5.1. …

Security and privacy in IoT: a survey

PM Chanal, MS Kakkasageri - Wireless Personal Communications, 2020 - Springer
… Both service management and composition layer present the … Confidentiality and privacy
are important concerns for … -by-Hop routing protocol (PPHH) by which a secure path is selected …

Security and privacy requirements for electronic consent: a systematic literature review

S Verreydt, K Yskout, W Joosen - ACM Transactions on Computing for …, 2021 - dl.acm.org
… For example, writing a confidential and secure smart contract demands knowledge about …
of all blockchain security and confidentiality. Although state-of-the-art encryption protocols are …