Blogs (61) >>
Tue 17 Jul 2018 14:30 - 15:00 at Bangkok - Session 2 Chair(s): Frank S. de Boer

Cryptographic protocols are often specified by narrations, i.e., finite sequences of message exchanges that show the intended execution of the protocol. Another use of narrations is to describe attacks. We propose in this paper to compile, when possible, attack describing narrations into a set of tests that honest participants can perform to exclude these executions. These tests can be implemented in monitors to protect existing implementation from rogue behaviour.

Tue 17 Jul

14:00 - 15:30: VORTEX - Session 2 at Bangkok
Chair(s): Frank S. de BoerCentrum Wiskunde & Informatica, Leiden University
vortex-2018-papers14:00 - 14:30
Eduardo Geraldo, João Costa SecoNOVA LINCS -- Universidade Nova de Lisboa
vortex-2018-papers14:30 - 15:00
vortex-2018-papers15:00 - 15:30
Giorgio AudritoUniversità di Torino, Ferruccio DamianiUniversity of Turin, Volker StolzHøgskulen på Vestlandet, Mirko ViroliUniversity of Bologna