Please use this identifier to cite or link to this item:
https://www.um.edu.mt/library/oar/handle/123456789/91852
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Colombo, Christian | - |
dc.contributor.author | González Vasco, María Isabel | - |
dc.contributor.author | Vella, Mark Joseph | - |
dc.contributor.author | Zajac, Pavol | - |
dc.date.accessioned | 2022-03-21T10:17:27Z | - |
dc.date.available | 2022-03-21T10:17:27Z | - |
dc.date.issued | 2019 | - |
dc.identifier.citation | Colombo, C., Gonzalez Vasco, M. I., Vella, M., & Zajac, P. (2019). Applying runtime verification to group key establishment. Secure Communication in the Quantum Era (SPS G5448), Slovakia. 1-2 | en_GB |
dc.identifier.uri | https://www.um.edu.mt/library/oar/handle/123456789/91852 | - |
dc.description.abstract | Securing communication networks relies fundamentally on the availability of secure cryptographic primitives, which enable authentication, confidentiality, and integrity. A typical starting point to establish secure communication channels is the execution of a protocol that authenticates all involved users/devices and establishes a common secret key among them. This task is referred to as authenticated group key establishment (AGKE). It is standard cryptographic practice to establish provable security guarantees in a suitable theoretical model, abstracting from implementation details. Modeling parties as Turing machines and adversarial capabilities through abstract oracles is a common technique that facilitates a theoretical analysis, but the implementation of a “theoretically secure” protocol may well be susceptible to runtime attacks. A number of authors have explored the use of runtime verification as a means of hardening a security-critical protocol implementation [2, 10, 7, 8]. The aim of this presentation is to give a brief overview of these works. | en_GB |
dc.language.iso | en | en_GB |
dc.publisher | SPS | en_GB |
dc.rights | info:eu-repo/semantics/restrictedAccess | en_GB |
dc.subject | Aspect-oriented programming | en_GB |
dc.subject | Computer software -- Development | en_GB |
dc.subject | Real-time data processing | en_GB |
dc.subject | Java (Computer program language) | en_GB |
dc.title | Applying runtime verification to group key establishment | en_GB |
dc.type | conferenceObject | en_GB |
dc.rights.holder | The copyright of this work belongs to the author(s)/publisher. The rights of this work are as defined by the appropriate Copyright Legislation or as modified by any successive legislation. Users may access this work and can make use of the information contained in accordance with the Copyright Legislation provided that the author must be properly acknowledged. Further distribution or reproduction in any format is prohibited without the prior permission of the copyright holder | en_GB |
dc.bibliographicCitation.conferencename | Secure Communication in the Quantum Era (SPS G5448) | en_GB |
dc.bibliographicCitation.conferenceplace | Slovakia, January 2019 | en_GB |
dc.description.reviewed | peer-reviewed | en_GB |
Appears in Collections: | Scholarly Works - FacICTCS |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Applying_runtime_verification_to_group_key_establishment.pdf Restricted Access | 106.07 kB | Adobe PDF | View/Open Request a copy |
Items in OAR@UM are protected by copyright, with all rights reserved, unless otherwise indicated.