The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Obol is a protocol programming language. The language is domain specific, and has been designed to facilitate error-free implementation of security protocols. Selecting the primitives of the language is, basically, concerned with determining which issues needs to be visible to the protocol programmer, and which can be left to the runtime without further ado. The basic abstractions...
Chris Mitchell: Arguably, different encryption primitives have different properties, for example they may or may not offer non-malleability. That’s an important distinction, because some protocols require non-malleable encryption, and some don’t. Reply: Yes, this is a good point. I have been told by my advisor earlier in my life, never say, this is a good question, because...
Unlike many other classes of hardware, smartcards do not have the ability to communicate securely with the user. Deprived of me- ans to keep the owner informed, the positive properties of smartcards are difficult to utilize. We explore the area at the border between smartcards and other, more powerful (and thus more useful), machines. On the other side of this border we find the Personal Digital Assistant...
When the safety community designs their systems to also maintain security properties, it is likely that public-key encryption will be among the tools that are applied. The security guarantees of this technology are based on a particular model of computation. We present the properties of this model that are relevant in the setting of distributed systems. Of particular importance is that the...
Even though PDAs in general ?? but smartcards in particular ?? are preferred over general-purpose computers to keep secrets, because they have meager resources, including them in security protocols is difficult. The PDAs?? and again smartcards in particular ?? end up as a mere key-store and their processing power is not used. We describe a mechanism that allows such anemic computers to fully participate...
Fair exchange constitutes a fundamental mechanism for electronic commerce. Fair exchange assumes that it is possible to verify the correctness of the digital items to be exchanged. However, when an item is indescribable , i.e., it cannot be formally specified, its verification becomes difficult, if not impossible. This hinders a practical deployment of fair exchange. We propose a methodology for...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.