Please use this identifier to cite or link to this item: https://www.um.edu.mt/library/oar/handle/123456789/91852
Full metadata record
DC FieldValueLanguage
dc.contributor.authorColombo, Christian-
dc.contributor.authorGonzález Vasco, María Isabel-
dc.contributor.authorVella, Mark Joseph-
dc.contributor.authorZajac, Pavol-
dc.date.accessioned2022-03-21T10:17:27Z-
dc.date.available2022-03-21T10:17:27Z-
dc.date.issued2019-
dc.identifier.citationColombo, C., Gonzalez Vasco, M. I., Vella, M., & Zajac, P. (2019). Applying runtime verification to group key establishment. Secure Communication in the Quantum Era (SPS G5448), Slovakia. 1-2en_GB
dc.identifier.urihttps://www.um.edu.mt/library/oar/handle/123456789/91852-
dc.description.abstractSecuring communication networks relies fundamentally on the availability of secure cryptographic primitives, which enable authentication, confidentiality, and integrity. A typical starting point to establish secure communication channels is the execution of a protocol that authenticates all involved users/devices and establishes a common secret key among them. This task is referred to as authenticated group key establishment (AGKE). It is standard cryptographic practice to establish provable security guarantees in a suitable theoretical model, abstracting from implementation details. Modeling parties as Turing machines and adversarial capabilities through abstract oracles is a common technique that facilitates a theoretical analysis, but the implementation of a “theoretically secure” protocol may well be susceptible to runtime attacks. A number of authors have explored the use of runtime verification as a means of hardening a security-critical protocol implementation [2, 10, 7, 8]. The aim of this presentation is to give a brief overview of these works.en_GB
dc.language.isoenen_GB
dc.publisherSPSen_GB
dc.rightsinfo:eu-repo/semantics/restrictedAccessen_GB
dc.subjectAspect-oriented programmingen_GB
dc.subjectComputer software -- Developmenten_GB
dc.subjectReal-time data processingen_GB
dc.subjectJava (Computer program language)en_GB
dc.titleApplying runtime verification to group key establishmenten_GB
dc.typeconferenceObjecten_GB
dc.rights.holderThe copyright of this work belongs to the author(s)/publisher. The rights of this work are as defined by the appropriate Copyright Legislation or as modified by any successive legislation. Users may access this work and can make use of the information contained in accordance with the Copyright Legislation provided that the author must be properly acknowledged. Further distribution or reproduction in any format is prohibited without the prior permission of the copyright holderen_GB
dc.bibliographicCitation.conferencenameSecure Communication in the Quantum Era (SPS G5448)en_GB
dc.bibliographicCitation.conferenceplaceSlovakia, January 2019en_GB
dc.description.reviewedpeer-revieweden_GB
Appears in Collections:Scholarly Works - FacICTCS

Files in This Item:
File Description SizeFormat 
Applying_runtime_verification_to_group_key_establishment.pdf
  Restricted Access
106.07 kBAdobe PDFView/Open Request a copy


Items in OAR@UM are protected by copyright, with all rights reserved, unless otherwise indicated.