Serveur d'exploration sur la recherche en informatique en Lorraine

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

Universally Composable Key-Management

Identifieur interne : 002955 ( Istex/Corpus ); précédent : 002954; suivant : 002956

Universally Composable Key-Management

Auteurs : Steve Kremer ; Robert Künnemann ; Graham Steel

Source :

RBID : ISTEX:AF2EF7C2028EB3DB0F74AD6E90BA96DA72178F4F

Abstract

Abstract: We present the first universally composable key-management functionality, formalized in the GNUC framework by Hofheinz and Shoup. It allows the enforcement of a wide range of security policies and can be extended by diverse key usage operations with no need to repeat the security proof. We illustrate its use by proving an implementation of a security token secure with respect to arbitrary key-usage operations and explore a proof technique that allows the storage of cryptographic keys externally, a novel development in simulation-based security frameworks.

Url:
DOI: 10.1007/978-3-642-40203-6_19

Links to Exploration step

ISTEX:AF2EF7C2028EB3DB0F74AD6E90BA96DA72178F4F

Le document en format XML

<record>
<TEI wicri:istexFullTextTei="biblStruct">
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en">Universally Composable Key-Management</title>
<author>
<name sortKey="Kremer, Steve" sort="Kremer, Steve" uniqKey="Kremer S" first="Steve" last="Kremer">Steve Kremer</name>
<affiliation>
<mods:affiliation>LORIA & INRIA Nancy – Grand-Est, France</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Kunnemann, Robert" sort="Kunnemann, Robert" uniqKey="Kunnemann R" first="Robert" last="Künnemann">Robert Künnemann</name>
<affiliation>
<mods:affiliation>INRIA Paris – Rocquencourt, France</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Steel, Graham" sort="Steel, Graham" uniqKey="Steel G" first="Graham" last="Steel">Graham Steel</name>
<affiliation>
<mods:affiliation>INRIA Paris – Rocquencourt, France</mods:affiliation>
</affiliation>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:AF2EF7C2028EB3DB0F74AD6E90BA96DA72178F4F</idno>
<date when="2013" year="2013">2013</date>
<idno type="doi">10.1007/978-3-642-40203-6_19</idno>
<idno type="url">https://api.istex.fr/ark:/67375/HCB-KL61J475-M/fulltext.pdf</idno>
<idno type="wicri:Area/Istex/Corpus">002955</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Corpus" wicri:corpus="ISTEX">002955</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title level="a" type="main" xml:lang="en">Universally Composable Key-Management</title>
<author>
<name sortKey="Kremer, Steve" sort="Kremer, Steve" uniqKey="Kremer S" first="Steve" last="Kremer">Steve Kremer</name>
<affiliation>
<mods:affiliation>LORIA & INRIA Nancy – Grand-Est, France</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Kunnemann, Robert" sort="Kunnemann, Robert" uniqKey="Kunnemann R" first="Robert" last="Künnemann">Robert Künnemann</name>
<affiliation>
<mods:affiliation>INRIA Paris – Rocquencourt, France</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Steel, Graham" sort="Steel, Graham" uniqKey="Steel G" first="Graham" last="Steel">Graham Steel</name>
<affiliation>
<mods:affiliation>INRIA Paris – Rocquencourt, France</mods:affiliation>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series>
<title level="s" type="main" xml:lang="en">Lecture Notes in Computer Science</title>
<idno type="ISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="ISSN">0302-9743</idno>
</series>
</biblStruct>
</sourceDesc>
<seriesStmt>
<idno type="ISSN">0302-9743</idno>
</seriesStmt>
</fileDesc>
<profileDesc>
<textClass></textClass>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">Abstract: We present the first universally composable key-management functionality, formalized in the GNUC framework by Hofheinz and Shoup. It allows the enforcement of a wide range of security policies and can be extended by diverse key usage operations with no need to repeat the security proof. We illustrate its use by proving an implementation of a security token secure with respect to arbitrary key-usage operations and explore a proof technique that allows the storage of cryptographic keys externally, a novel development in simulation-based security frameworks.</div>
</front>
</TEI>
<istex>
<corpusName>springer-ebooks</corpusName>
<author>
<json:item>
<name>Steve Kremer</name>
<affiliations>
<json:string>LORIA & INRIA Nancy – Grand-Est, France</json:string>
</affiliations>
</json:item>
<json:item>
<name>Robert Künnemann</name>
<affiliations>
<json:string>INRIA Paris – Rocquencourt, France</json:string>
</affiliations>
</json:item>
<json:item>
<name>Graham Steel</name>
<affiliations>
<json:string>INRIA Paris – Rocquencourt, France</json:string>
</affiliations>
</json:item>
</author>
<arkIstex>ark:/67375/HCB-KL61J475-M</arkIstex>
<language>
<json:string>eng</json:string>
</language>
<originalGenre>
<json:string>OriginalPaper</json:string>
</originalGenre>
<abstract>Abstract: We present the first universally composable key-management functionality, formalized in the GNUC framework by Hofheinz and Shoup. It allows the enforcement of a wide range of security policies and can be extended by diverse key usage operations with no need to repeat the security proof. We illustrate its use by proving an implementation of a security token secure with respect to arbitrary key-usage operations and explore a proof technique that allows the storage of cryptographic keys externally, a novel development in simulation-based security frameworks.</abstract>
<qualityIndicators>
<score>8.02</score>
<pdfWordCount>8913</pdfWordCount>
<pdfCharCount>45772</pdfCharCount>
<pdfVersion>1.6</pdfVersion>
<pdfPageCount>18</pdfPageCount>
<pdfPageSize>439.363 x 666.131 pts</pdfPageSize>
<refBibsNative>false</refBibsNative>
<abstractWordCount>85</abstractWordCount>
<abstractCharCount>571</abstractCharCount>
<keywordCount>0</keywordCount>
</qualityIndicators>
<title>Universally Composable Key-Management</title>
<chapterId>
<json:string>19</json:string>
<json:string>Chap19</json:string>
</chapterId>
<genre>
<json:string>conference</json:string>
</genre>
<serie>
<title>Lecture Notes in Computer Science</title>
<language>
<json:string>unknown</json:string>
</language>
<copyrightDate>2013</copyrightDate>
<issn>
<json:string>0302-9743</json:string>
</issn>
<eissn>
<json:string>1611-3349</json:string>
</eissn>
<editor>
<json:item>
<name>David Hutchison</name>
<affiliations>
<json:string>Lancaster University, Lancaster, UK</json:string>
</affiliations>
</json:item>
<json:item>
<name>Takeo Kanade</name>
<affiliations>
<json:string>Carnegie Mellon University, Pittsburgh, PA, USA</json:string>
</affiliations>
</json:item>
<json:item>
<name>Josef Kittler</name>
<affiliations>
<json:string>University of Surrey, Guildford, UK</json:string>
</affiliations>
</json:item>
<json:item>
<name>Jon M. Kleinberg</name>
<affiliations>
<json:string>Cornell University, Ithaca, NY, USA</json:string>
</affiliations>
</json:item>
<json:item>
<name>Friedemann Mattern</name>
<affiliations>
<json:string>ETH Zurich, Zurich, Switzerland</json:string>
</affiliations>
</json:item>
<json:item>
<name>John C. Mitchell</name>
<affiliations>
<json:string>Stanford University, Stanford, CA, USA</json:string>
</affiliations>
</json:item>
<json:item>
<name>Moni Naor</name>
<affiliations>
<json:string>Weizmann Institute of Science, Rehovot, Israel</json:string>
</affiliations>
</json:item>
<json:item>
<name>Oscar Nierstrasz</name>
<affiliations>
<json:string>University of Bern, Bern, Switzerland</json:string>
</affiliations>
</json:item>
<json:item>
<name>C. Pandu Rangan</name>
<affiliations>
<json:string>Indian Institute of Technology, Madras, India</json:string>
</affiliations>
</json:item>
<json:item>
<name>Bernhard Steffen</name>
<affiliations>
<json:string>University of Dortmund, Dortmund, Germany</json:string>
</affiliations>
</json:item>
<json:item>
<name>Madhu Sudan</name>
<affiliations>
<json:string>Massachusetts Institute of Technology, MA, USA</json:string>
</affiliations>
</json:item>
<json:item>
<name>Demetri Terzopoulos</name>
<affiliations>
<json:string>University of California, Los Angeles, CA, USA</json:string>
</affiliations>
</json:item>
<json:item>
<name>Doug Tygar</name>
<affiliations>
<json:string>University of California, Berkeley, CA, USA</json:string>
</affiliations>
</json:item>
<json:item>
<name>Moshe Y. Vardi</name>
<affiliations>
<json:string>Rice University, Houston, TX, USA</json:string>
</affiliations>
</json:item>
<json:item>
<name>Gerhard Weikum</name>
<affiliations>
<json:string>Max-Planck Institute of Computer Science, Saarbrücken, Germany</json:string>
</affiliations>
</json:item>
</editor>
</serie>
<host>
<title>Computer Security – ESORICS 2013</title>
<language>
<json:string>unknown</json:string>
</language>
<copyrightDate>2013</copyrightDate>
<doi>
<json:string>10.1007/978-3-642-40203-6</json:string>
</doi>
<issn>
<json:string>0302-9743</json:string>
</issn>
<eissn>
<json:string>1611-3349</json:string>
</eissn>
<eisbn>
<json:string>978-3-642-40203-6</json:string>
</eisbn>
<bookId>
<json:string>978-3-642-40203-6</json:string>
</bookId>
<isbn>
<json:string>978-3-642-40202-9</json:string>
</isbn>
<volume>8134</volume>
<pages>
<first>327</first>
<last>344</last>
</pages>
<genre>
<json:string>book-series</json:string>
</genre>
<editor>
<json:item>
<name>Jason Crampton</name>
<affiliations>
<json:string>Information Security Group, University of London, Royal Holloway, TW20 0EX, Egham Hill, Egham, UK</json:string>
<json:string>E-mail: jason.crampton@rhul.ac.uk</json:string>
</affiliations>
</json:item>
<json:item>
<name>Sushil Jajodia</name>
<affiliations>
<json:string>Center for Secure Information Systems, George Mason University, 4400 University Drive, 22030-4422, Fairfax, VA, USA</json:string>
<json:string>E-mail: jajodia@gmu.edu</json:string>
</affiliations>
</json:item>
<json:item>
<name>Keith Mayes</name>
<affiliations>
<json:string>Information Security Group, University of London, Royal Holloway, TW20 0EX, Egham Hill, Egham, UK</json:string>
<json:string>E-mail: keith.mayes@rhul.ac.uk</json:string>
</affiliations>
</json:item>
</editor>
<subject>
<json:item>
<value>Computer Science</value>
</json:item>
<json:item>
<value>Computer Science</value>
</json:item>
<json:item>
<value>Systems and Data Security</value>
</json:item>
<json:item>
<value>Data Encryption</value>
</json:item>
<json:item>
<value>Management of Computing and Information Systems</value>
</json:item>
<json:item>
<value>e-Commerce/e-business</value>
</json:item>
<json:item>
<value>Computer Communication Networks</value>
</json:item>
</subject>
</host>
<ark>
<json:string>ark:/67375/HCB-KL61J475-M</json:string>
</ark>
<publicationDate>2013</publicationDate>
<copyrightDate>2013</copyrightDate>
<doi>
<json:string>10.1007/978-3-642-40203-6_19</json:string>
</doi>
<id>AF2EF7C2028EB3DB0F74AD6E90BA96DA72178F4F</id>
<score>1</score>
<fulltext>
<json:item>
<extension>pdf</extension>
<original>true</original>
<mimetype>application/pdf</mimetype>
<uri>https://api.istex.fr/ark:/67375/HCB-KL61J475-M/fulltext.pdf</uri>
</json:item>
<json:item>
<extension>zip</extension>
<original>false</original>
<mimetype>application/zip</mimetype>
<uri>https://api.istex.fr/ark:/67375/HCB-KL61J475-M/bundle.zip</uri>
</json:item>
<istex:fulltextTEI uri="https://api.istex.fr/ark:/67375/HCB-KL61J475-M/fulltext.tei">
<teiHeader>
<fileDesc>
<titleStmt>
<title level="a" type="main" xml:lang="en">Universally Composable Key-Management</title>
</titleStmt>
<publicationStmt>
<authority>ISTEX</authority>
<availability>
<licence>Springer-Verlag Berlin Heidelberg</licence>
</availability>
<date when="2013">2013</date>
</publicationStmt>
<notesStmt>
<note type="conference" source="proceedings" scheme="https://content-type.data.istex.fr/ark:/67375/XTP-BFHXPBJJ-3">conference</note>
<note type="publication-type" subtype="book-series" scheme="https://publication-type.data.istex.fr/ark:/67375/JMC-0G6R5W5T-Z">book-series</note>
</notesStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title level="a" type="main" xml:lang="en">Universally Composable Key-Management</title>
<author>
<persName>
<forename type="first">Steve</forename>
<surname>Kremer</surname>
</persName>
<affiliation>
<idno type="GRID" subtype="Institution">grid.457353.3</idno>
<idno type="ISNI" subtype="Institution">0000000114113805</idno>
<orgName type="institution">LORIA & INRIA Nancy – Grand-Est</orgName>
<address>
<country key="FR">FRANCE</country>
</address>
</affiliation>
</author>
<author>
<persName>
<forename type="first">Robert</forename>
<surname>Künnemann</surname>
</persName>
<affiliation>
<idno type="GRID" subtype="Institution">grid.5328.c</idno>
<idno type="ISNI" subtype="Institution">0000000121863954</idno>
<orgName type="institution">INRIA Paris – Rocquencourt</orgName>
<address>
<country key="FR">FRANCE</country>
</address>
</affiliation>
</author>
<author>
<persName>
<forename type="first">Graham</forename>
<surname>Steel</surname>
</persName>
<affiliation>
<idno type="GRID" subtype="Institution">grid.5328.c</idno>
<idno type="ISNI" subtype="Institution">0000000121863954</idno>
<orgName type="institution">INRIA Paris – Rocquencourt</orgName>
<address>
<country key="FR">FRANCE</country>
</address>
</affiliation>
</author>
<idno type="istex">AF2EF7C2028EB3DB0F74AD6E90BA96DA72178F4F</idno>
<idno type="ark">ark:/67375/HCB-KL61J475-M</idno>
<idno type="DOI">10.1007/978-3-642-40203-6_19</idno>
</analytic>
<monogr>
<title level="m" type="main">Computer Security – ESORICS 2013</title>
<title level="m" type="sub">18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings</title>
<title level="m" type="part">Formal Models and Methods</title>
<idno type="DOI">10.1007/978-3-642-40203-6</idno>
<idno type="book-id">978-3-642-40203-6</idno>
<idno type="ISBN">978-3-642-40202-9</idno>
<idno type="eISBN">978-3-642-40203-6</idno>
<idno type="chapter-id">Chap19</idno>
<idno type="part-id">Part6</idno>
<editor>
<persName>
<forename type="first">Jason</forename>
<surname>Crampton</surname>
</persName>
<email>jason.crampton@rhul.ac.uk</email>
<affiliation>
<orgName type="department">Information Security Group</orgName>
<orgName type="institution">University of London, Royal Holloway</orgName>
<address>
<postCode>TW20 0EX</postCode>
<settlement>Egham Hill</settlement>
<region>Egham</region>
<country key="GB">UNITED KINGDOM</country>
</address>
</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Sushil</forename>
<surname>Jajodia</surname>
</persName>
<email>jajodia@gmu.edu</email>
<affiliation>
<idno type="GRID" subtype="Institution">grid.22448.38</idno>
<idno type="ISNI" subtype="Institution">0000000419368032</idno>
<orgName type="department">Center for Secure Information Systems</orgName>
<orgName type="institution">George Mason University</orgName>
<address>
<street>4400 University Drive</street>
<postCode>22030-4422</postCode>
<settlement>Fairfax</settlement>
<region>VA</region>
<country key="US">UNITED STATES</country>
</address>
</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Keith</forename>
<surname>Mayes</surname>
</persName>
<email>keith.mayes@rhul.ac.uk</email>
<affiliation>
<orgName type="department">Information Security Group</orgName>
<orgName type="institution">University of London, Royal Holloway</orgName>
<address>
<postCode>TW20 0EX</postCode>
<settlement>Egham Hill</settlement>
<region>Egham</region>
<country key="GB">UNITED KINGDOM</country>
</address>
</affiliation>
</editor>
<meeting>
<title type="name">European Symposium on Research in Computer Security</title>
<title type="abbr">ESORICS</title>
<idno type="conf-number">18</idno>
<idno type="Springer">esorics</idno>
<idno type="DBLP">esorics</idno>
<idno type="conf-ID">esorics2013</idno>
<settlement>Egham</settlement>
<country>UK</country>
<date from="20130909" to="20130913"></date>
</meeting>
<imprint>
<biblScope unit="vol">8134</biblScope>
<biblScope unit="page" from="327">327</biblScope>
<biblScope unit="page" to="344">344</biblScope>
<biblScope unit="chapter-count">43</biblScope>
<biblScope unit="part-chapter-count">4</biblScope>
</imprint>
</monogr>
<series>
<title level="s" type="main" xml:lang="en">Lecture Notes in Computer Science</title>
<editor>
<persName>
<forename type="first">David</forename>
<surname>Hutchison</surname>
</persName>
<affiliation>
<idno type="GRID" subtype="Institution">grid.9835.7</idno>
<idno type="ISNI" subtype="Institution">0000000081906402</idno>
<orgName type="institution">Lancaster University</orgName>
<address>
<settlement>Lancaster</settlement>
<country key="GB">UNITED KINGDOM</country>
</address>
</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Takeo</forename>
<surname>Kanade</surname>
</persName>
<affiliation>
<idno type="GRID" subtype="Institution">grid.147455.6</idno>
<idno type="ISNI" subtype="Institution">0000000120970344</idno>
<orgName type="institution">Carnegie Mellon University</orgName>
<address>
<settlement>Pittsburgh</settlement>
<region>PA</region>
<country key="US">UNITED STATES</country>
</address>
</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Josef</forename>
<surname>Kittler</surname>
</persName>
<affiliation>
<idno type="GRID" subtype="Institution">grid.5475.3</idno>
<idno type="ISNI" subtype="Institution">0000000404074824</idno>
<orgName type="institution">University of Surrey</orgName>
<address>
<settlement>Guildford</settlement>
<country key="GB">UNITED KINGDOM</country>
</address>
</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Jon</forename>
<forename type="first">M.</forename>
<surname>Kleinberg</surname>
</persName>
<affiliation>
<idno type="GRID" subtype="Institution">grid.5386.8</idno>
<idno type="ISNI" subtype="Institution">000000041936877X</idno>
<orgName type="institution">Cornell University</orgName>
<address>
<settlement>Ithaca</settlement>
<region>NY</region>
<country key="US">UNITED STATES</country>
</address>
</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Friedemann</forename>
<surname>Mattern</surname>
</persName>
<affiliation>
<idno type="GRID" subtype="Institution">grid.5801.c</idno>
<idno type="ISNI" subtype="Institution">0000000121562780</idno>
<orgName type="institution">ETH Zurich</orgName>
<address>
<settlement>Zurich</settlement>
<country key="CH">SWITZERLAND</country>
</address>
</affiliation>
</editor>
<editor>
<persName>
<forename type="first">John</forename>
<forename type="first">C.</forename>
<surname>Mitchell</surname>
</persName>
<affiliation>
<idno type="GRID" subtype="Institution">grid.168010.e</idno>
<idno type="ISNI" subtype="Institution">0000000419368956</idno>
<orgName type="institution">Stanford University</orgName>
<address>
<settlement>Stanford</settlement>
<region>CA</region>
<country key="US">UNITED STATES</country>
</address>
</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Moni</forename>
<surname>Naor</surname>
</persName>
<affiliation>
<idno type="GRID" subtype="Institution">grid.13992.30</idno>
<idno type="ISNI" subtype="Institution">0000000406047563</idno>
<orgName type="institution">Weizmann Institute of Science</orgName>
<address>
<settlement>Rehovot</settlement>
<country key="IL">ISRAEL</country>
</address>
</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Oscar</forename>
<surname>Nierstrasz</surname>
</persName>
<affiliation>
<idno type="GRID" subtype="Institution">grid.5734.5</idno>
<idno type="ISNI" subtype="Institution">0000000107265157</idno>
<orgName type="institution">University of Bern</orgName>
<address>
<settlement>Bern</settlement>
<country key="CH">SWITZERLAND</country>
</address>
</affiliation>
</editor>
<editor>
<persName>
<forename type="first">C.</forename>
<surname>Pandu Rangan</surname>
</persName>
<affiliation>
<idno type="GRID" subtype="Institution">grid.417969.4</idno>
<idno type="ISNI" subtype="Institution">0000000123151926</idno>
<orgName type="institution">Indian Institute of Technology</orgName>
<address>
<settlement>Madras</settlement>
<country key="IN">INDIA</country>
</address>
</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Bernhard</forename>
<surname>Steffen</surname>
</persName>
<affiliation>
<idno type="GRID" subtype="Institution">grid.5675.1</idno>
<idno type="ISNI" subtype="Institution">0000000104169637</idno>
<orgName type="institution">University of Dortmund</orgName>
<address>
<settlement>Dortmund</settlement>
<country key="DE">GERMANY</country>
</address>
</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Madhu</forename>
<surname>Sudan</surname>
</persName>
<affiliation>
<idno type="GRID" subtype="Institution">grid.116068.8</idno>
<idno type="ISNI" subtype="Institution">0000000123412786</idno>
<orgName type="institution">Massachusetts Institute of Technology</orgName>
<address>
<region>MA</region>
<country key="US">UNITED STATES</country>
</address>
</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Demetri</forename>
<surname>Terzopoulos</surname>
</persName>
<affiliation>
<idno type="GRID" subtype="Institution">grid.19006.3e</idno>
<idno type="ISNI" subtype="Institution">0000000096326718</idno>
<orgName type="institution">University of California</orgName>
<address>
<settlement>Los Angeles</settlement>
<region>CA</region>
<country key="US">UNITED STATES</country>
</address>
</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Doug</forename>
<surname>Tygar</surname>
</persName>
<affiliation>
<idno type="GRID" subtype="Institution">grid.47840.3f</idno>
<idno type="ISNI" subtype="Institution">0000000121817878</idno>
<orgName type="institution">University of California</orgName>
<address>
<settlement>Berkeley</settlement>
<region>CA</region>
<country key="US">UNITED STATES</country>
</address>
</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Moshe</forename>
<forename type="first">Y.</forename>
<surname>Vardi</surname>
</persName>
<affiliation>
<idno type="GRID" subtype="Institution">grid.21940.3e</idno>
<idno type="ISNI" subtype="Institution"> 0000000419368278</idno>
<orgName type="institution">Rice University</orgName>
<address>
<settlement>Houston</settlement>
<region>TX</region>
<country key="US">UNITED STATES</country>
</address>
</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Gerhard</forename>
<surname>Weikum</surname>
</persName>
<affiliation>
<idno type="GRID" subtype="Institution">grid.419607.d</idno>
<idno type="ISNI" subtype="Institution">0000000120969941</idno>
<orgName type="institution">Max-Planck Institute of Computer Science</orgName>
<address>
<settlement>Saarbrücken</settlement>
<country key="DE">GERMANY</country>
</address>
</affiliation>
</editor>
<idno type="pISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="seriesID">558</idno>
</series>
</biblStruct>
</sourceDesc>
</fileDesc>
<profileDesc>
<abstract xml:lang="en">
<head>Abstract</head>
<p>We present the first universally composable key-management functionality, formalized in the GNUC framework by Hofheinz and Shoup. It allows the enforcement of a wide range of security policies and can be extended by diverse key usage operations with no need to repeat the security proof. We illustrate its use by proving an implementation of a security token secure with respect to arbitrary key-usage operations and explore a proof technique that allows the storage of cryptographic keys externally, a novel development in simulation-based security frameworks.</p>
</abstract>
<textClass ana="subject">
<keywords scheme="book-subject-collection">
<list>
<label>SUCO11645</label>
<item>
<term>Computer Science</term>
</item>
</list>
</keywords>
</textClass>
<textClass ana="subject">
<keywords scheme="book-subject">
<list>
<label>SCI</label>
<item>
<term type="Primary">Computer Science</term>
</item>
<label>SCI14050</label>
<item>
<term type="Secondary" subtype="priority-1">Systems and Data Security</term>
</item>
<label>SCI15033</label>
<item>
<term type="Secondary" subtype="priority-2">Data Encryption</term>
</item>
<label>SCI24067</label>
<item>
<term type="Secondary" subtype="priority-3">Management of Computing and Information Systems</term>
</item>
<label>SCI26000</label>
<item>
<term type="Secondary" subtype="priority-4">e-Commerce/e-business</term>
</item>
<label>SCI13022</label>
<item>
<term type="Secondary" subtype="priority-5">Computer Communication Networks</term>
</item>
</list>
</keywords>
</textClass>
<langUsage>
<language ident="EN"></language>
</langUsage>
</profileDesc>
</teiHeader>
</istex:fulltextTEI>
<json:item>
<extension>txt</extension>
<original>false</original>
<mimetype>text/plain</mimetype>
<uri>https://api.istex.fr/ark:/67375/HCB-KL61J475-M/fulltext.txt</uri>
</json:item>
</fulltext>
<metadata>
<istex:metadataXml wicri:clean="corpus springer-ebooks not found" wicri:toSee="no header">
<istex:xmlDeclaration>version="1.0" encoding="UTF-8"</istex:xmlDeclaration>
<istex:docType PUBLIC="-//Springer-Verlag//DTD A++ V2.4//EN" URI="http://devel.springer.de/A++/V2.4/DTD/A++V2.4.dtd" name="istex:docType"></istex:docType>
<istex:document>
<Publisher>
<PublisherInfo>
<PublisherName>Springer Berlin Heidelberg</PublisherName>
<PublisherLocation>Berlin, Heidelberg</PublisherLocation>
<PublisherImprintName>Springer</PublisherImprintName>
</PublisherInfo>
<Series>
<SeriesInfo ID="Series558" SeriesType="Series" TocLevels="0">
<SeriesID>558</SeriesID>
<SeriesPrintISSN>0302-9743</SeriesPrintISSN>
<SeriesElectronicISSN>1611-3349</SeriesElectronicISSN>
<SeriesTitle Language="En">Lecture Notes in Computer Science</SeriesTitle>
</SeriesInfo>
<SeriesHeader>
<EditorGroup>
<Editor AffiliationIDS="Aff1">
<EditorName DisplayOrder="Western">
<GivenName>David</GivenName>
<FamilyName>Hutchison</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff2">
<EditorName DisplayOrder="Western">
<GivenName>Takeo</GivenName>
<FamilyName>Kanade</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff3">
<EditorName DisplayOrder="Western">
<GivenName>Josef</GivenName>
<FamilyName>Kittler</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff4">
<EditorName DisplayOrder="Western">
<GivenName>Jon</GivenName>
<GivenName>M.</GivenName>
<FamilyName>Kleinberg</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff5">
<EditorName DisplayOrder="Western">
<GivenName>Friedemann</GivenName>
<FamilyName>Mattern</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff6">
<EditorName DisplayOrder="Western">
<GivenName>John</GivenName>
<GivenName>C.</GivenName>
<FamilyName>Mitchell</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff7">
<EditorName DisplayOrder="Western">
<GivenName>Moni</GivenName>
<FamilyName>Naor</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff8">
<EditorName DisplayOrder="Western">
<GivenName>Oscar</GivenName>
<FamilyName>Nierstrasz</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff9">
<EditorName DisplayOrder="Western">
<GivenName>C.</GivenName>
<FamilyName>Pandu Rangan</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff10">
<EditorName DisplayOrder="Western">
<GivenName>Bernhard</GivenName>
<FamilyName>Steffen</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff11">
<EditorName DisplayOrder="Western">
<GivenName>Madhu</GivenName>
<FamilyName>Sudan</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff12">
<EditorName DisplayOrder="Western">
<GivenName>Demetri</GivenName>
<FamilyName>Terzopoulos</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff13">
<EditorName DisplayOrder="Western">
<GivenName>Doug</GivenName>
<FamilyName>Tygar</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff14">
<EditorName DisplayOrder="Western">
<GivenName>Moshe</GivenName>
<GivenName>Y.</GivenName>
<FamilyName>Vardi</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff15">
<EditorName DisplayOrder="Western">
<GivenName>Gerhard</GivenName>
<FamilyName>Weikum</FamilyName>
</EditorName>
</Editor>
<Affiliation ID="Aff1">
<OrgID Level="Institution" Type="GRID">grid.9835.7</OrgID>
<OrgID Level="Institution" Type="ISNI">0000000081906402</OrgID>
<OrgName>Lancaster University</OrgName>
<OrgAddress>
<City>Lancaster</City>
<Country>UK</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff2">
<OrgID Level="Institution" Type="GRID">grid.147455.6</OrgID>
<OrgID Level="Institution" Type="ISNI">0000000120970344</OrgID>
<OrgName>Carnegie Mellon University</OrgName>
<OrgAddress>
<City>Pittsburgh</City>
<State>PA</State>
<Country>USA</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff3">
<OrgID Level="Institution" Type="GRID">grid.5475.3</OrgID>
<OrgID Level="Institution" Type="ISNI">0000000404074824</OrgID>
<OrgName>University of Surrey</OrgName>
<OrgAddress>
<City>Guildford</City>
<Country>UK</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff4">
<OrgID Level="Institution" Type="GRID">grid.5386.8</OrgID>
<OrgID Level="Institution" Type="ISNI">000000041936877X</OrgID>
<OrgName>Cornell University</OrgName>
<OrgAddress>
<City>Ithaca</City>
<State>NY</State>
<Country>USA</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff5">
<OrgID Level="Institution" Type="GRID">grid.5801.c</OrgID>
<OrgID Level="Institution" Type="ISNI">0000000121562780</OrgID>
<OrgName>ETH Zurich</OrgName>
<OrgAddress>
<City>Zurich</City>
<Country>Switzerland</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff6">
<OrgID Level="Institution" Type="GRID">grid.168010.e</OrgID>
<OrgID Level="Institution" Type="ISNI">0000000419368956</OrgID>
<OrgName>Stanford University</OrgName>
<OrgAddress>
<City>Stanford</City>
<State>CA</State>
<Country>USA</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff7">
<OrgID Level="Institution" Type="GRID">grid.13992.30</OrgID>
<OrgID Level="Institution" Type="ISNI">0000000406047563</OrgID>
<OrgName>Weizmann Institute of Science</OrgName>
<OrgAddress>
<City>Rehovot</City>
<Country>Israel</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff8">
<OrgID Level="Institution" Type="GRID">grid.5734.5</OrgID>
<OrgID Level="Institution" Type="ISNI">0000000107265157</OrgID>
<OrgName>University of Bern</OrgName>
<OrgAddress>
<City>Bern</City>
<Country>Switzerland</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff9">
<OrgID Level="Institution" Type="GRID">grid.417969.4</OrgID>
<OrgID Level="Institution" Type="ISNI">0000000123151926</OrgID>
<OrgName>Indian Institute of Technology</OrgName>
<OrgAddress>
<City>Madras</City>
<Country>India</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff10">
<OrgID Level="Institution" Type="GRID">grid.5675.1</OrgID>
<OrgID Level="Institution" Type="ISNI">0000000104169637</OrgID>
<OrgName>University of Dortmund</OrgName>
<OrgAddress>
<City>Dortmund</City>
<Country>Germany</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff11">
<OrgID Level="Institution" Type="GRID">grid.116068.8</OrgID>
<OrgID Level="Institution" Type="ISNI">0000000123412786</OrgID>
<OrgName>Massachusetts Institute of Technology</OrgName>
<OrgAddress>
<State>MA</State>
<Country>USA</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff12">
<OrgID Level="Institution" Type="GRID">grid.19006.3e</OrgID>
<OrgID Level="Institution" Type="ISNI">0000000096326718</OrgID>
<OrgName>University of California</OrgName>
<OrgAddress>
<City>Los Angeles</City>
<State>CA</State>
<Country>USA</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff13">
<OrgID Level="Institution" Type="GRID">grid.47840.3f</OrgID>
<OrgID Level="Institution" Type="ISNI">0000000121817878</OrgID>
<OrgName>University of California</OrgName>
<OrgAddress>
<City>Berkeley</City>
<State>CA</State>
<Country>USA</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff14">
<OrgID Level="Institution" Type="GRID">grid.21940.3e</OrgID>
<OrgID Level="Institution" Type="ISNI"> 0000000419368278</OrgID>
<OrgName>Rice University</OrgName>
<OrgAddress>
<City>Houston</City>
<State>TX</State>
<Country>USA</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff15">
<OrgID Level="Institution" Type="GRID">grid.419607.d</OrgID>
<OrgID Level="Institution" Type="ISNI">0000000120969941</OrgID>
<OrgName>Max-Planck Institute of Computer Science</OrgName>
<OrgAddress>
<City>Saarbrücken</City>
<Country>Germany</Country>
</OrgAddress>
</Affiliation>
</EditorGroup>
</SeriesHeader>
<Book Language="En">
<BookInfo BookProductType="Proceedings" ContainsESM="No" Language="En" MediaType="eBook" NumberingDepth="2" NumberingStyle="ContentOnly" OutputMedium="All" TocLevels="0">
<BookID>978-3-642-40203-6</BookID>
<BookTitle>Computer Security – ESORICS 2013</BookTitle>
<BookSubTitle>18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings</BookSubTitle>
<BookVolumeNumber>8134</BookVolumeNumber>
<BookSequenceNumber>8134</BookSequenceNumber>
<BookDOI>10.1007/978-3-642-40203-6</BookDOI>
<BookTitleID>317997</BookTitleID>
<BookPrintISBN>978-3-642-40202-9</BookPrintISBN>
<BookElectronicISBN>978-3-642-40203-6</BookElectronicISBN>
<BookChapterCount>43</BookChapterCount>
<BookCopyright>
<CopyrightHolderName>Springer-Verlag Berlin Heidelberg</CopyrightHolderName>
<CopyrightYear>2013</CopyrightYear>
</BookCopyright>
<BookSubjectGroup>
<BookSubject Code="SCI" Type="Primary">Computer Science</BookSubject>
<BookSubject Code="SCI14050" Priority="1" Type="Secondary">Systems and Data Security</BookSubject>
<BookSubject Code="SCI15033" Priority="2" Type="Secondary">Data Encryption</BookSubject>
<BookSubject Code="SCI24067" Priority="3" Type="Secondary">Management of Computing and Information Systems</BookSubject>
<BookSubject Code="SCI26000" Priority="4" Type="Secondary">e-Commerce/e-business</BookSubject>
<BookSubject Code="SCI13022" Priority="5" Type="Secondary">Computer Communication Networks</BookSubject>
<SubjectCollection Code="SUCO11645">Computer Science</SubjectCollection>
</BookSubjectGroup>
<BookContext>
<SeriesID>558</SeriesID>
</BookContext>
<ConferenceInfo>
<ConfSeriesName>European Symposium on Research in Computer Security</ConfSeriesName>
<ConfSeriesID Type="Springer">esorics</ConfSeriesID>
<ConfSeriesID Type="DBLP">esorics</ConfSeriesID>
<ConfEventID Type="Springer">esorics2013</ConfEventID>
<ConfEventAbbreviation>ESORICS</ConfEventAbbreviation>
<ConfNumber>18</ConfNumber>
<ConfEventLocation>
<City>Egham</City>
<Country>UK</Country>
</ConfEventLocation>
<ConfEventDateStart>
<Year>2013</Year>
<Month>9</Month>
<Day>9</Day>
</ConfEventDateStart>
<ConfEventDateEnd>
<Year>2013</Year>
<Month>9</Month>
<Day>13</Day>
</ConfEventDateEnd>
</ConferenceInfo>
</BookInfo>
<BookHeader>
<EditorGroup>
<Editor AffiliationIDS="Aff16">
<EditorName DisplayOrder="Western">
<GivenName>Jason</GivenName>
<FamilyName>Crampton</FamilyName>
</EditorName>
<Contact>
<Email>jason.crampton@rhul.ac.uk</Email>
</Contact>
</Editor>
<Editor AffiliationIDS="Aff17">
<EditorName DisplayOrder="Western">
<GivenName>Sushil</GivenName>
<FamilyName>Jajodia</FamilyName>
</EditorName>
<Contact>
<Email>jajodia@gmu.edu</Email>
</Contact>
</Editor>
<Editor AffiliationIDS="Aff16">
<EditorName DisplayOrder="Western">
<GivenName>Keith</GivenName>
<FamilyName>Mayes</FamilyName>
</EditorName>
<Contact>
<Email>keith.mayes@rhul.ac.uk</Email>
</Contact>
</Editor>
<Affiliation ID="Aff16">
<OrgDivision>Information Security Group</OrgDivision>
<OrgName>University of London, Royal Holloway</OrgName>
<OrgAddress>
<Postcode>TW20 0EX</Postcode>
<City>Egham Hill</City>
<State>Egham</State>
<Country>UK</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff17">
<OrgID Level="Institution" Type="GRID">grid.22448.38</OrgID>
<OrgID Level="Institution" Type="ISNI">0000000419368032</OrgID>
<OrgDivision>Center for Secure Information Systems</OrgDivision>
<OrgName>George Mason University</OrgName>
<OrgAddress>
<Street>4400 University Drive</Street>
<Postcode>22030-4422</Postcode>
<City>Fairfax</City>
<State>VA</State>
<Country>USA</Country>
</OrgAddress>
</Affiliation>
</EditorGroup>
</BookHeader>
<Part ID="Part6">
<PartInfo OutputMedium="All" TocLevels="0">
<PartID>6</PartID>
<PartSequenceNumber>6</PartSequenceNumber>
<PartTitle>Formal Models and Methods</PartTitle>
<PartChapterCount>4</PartChapterCount>
<PartContext>
<SeriesID>558</SeriesID>
<BookID>978-3-642-40203-6</BookID>
<BookTitle>Computer Security – ESORICS 2013</BookTitle>
</PartContext>
</PartInfo>
<Chapter ID="Chap19" Language="En">
<ChapterInfo ChapterType="OriginalPaper" ContainsESM="No" NumberingDepth="2" NumberingStyle="ContentOnly" TocLevels="0">
<ChapterID>19</ChapterID>
<ChapterDOI>10.1007/978-3-642-40203-6_19</ChapterDOI>
<ChapterSequenceNumber>19</ChapterSequenceNumber>
<ChapterTitle Language="En">Universally Composable Key-Management</ChapterTitle>
<ChapterFirstPage>327</ChapterFirstPage>
<ChapterLastPage>344</ChapterLastPage>
<ChapterCopyright>
<CopyrightHolderName>Springer-Verlag Berlin Heidelberg</CopyrightHolderName>
<CopyrightYear>2013</CopyrightYear>
</ChapterCopyright>
<ChapterGrants Type="Regular">
<MetadataGrant Grant="OpenAccess"></MetadataGrant>
<AbstractGrant Grant="OpenAccess"></AbstractGrant>
<BodyPDFGrant Grant="Restricted"></BodyPDFGrant>
<BodyHTMLGrant Grant="Restricted"></BodyHTMLGrant>
<BibliographyGrant Grant="Restricted"></BibliographyGrant>
<ESMGrant Grant="Restricted"></ESMGrant>
</ChapterGrants>
<ChapterContext>
<SeriesID>558</SeriesID>
<PartID>6</PartID>
<BookID>978-3-642-40203-6</BookID>
<BookTitle>Computer Security – ESORICS 2013</BookTitle>
</ChapterContext>
</ChapterInfo>
<ChapterHeader>
<AuthorGroup>
<Author AffiliationIDS="Aff18">
<AuthorName DisplayOrder="Western">
<GivenName>Steve</GivenName>
<FamilyName>Kremer</FamilyName>
</AuthorName>
</Author>
<Author AffiliationIDS="Aff19">
<AuthorName DisplayOrder="Western">
<GivenName>Robert</GivenName>
<FamilyName>Künnemann</FamilyName>
</AuthorName>
</Author>
<Author AffiliationIDS="Aff19">
<AuthorName DisplayOrder="Western">
<GivenName>Graham</GivenName>
<FamilyName>Steel</FamilyName>
</AuthorName>
</Author>
<Affiliation ID="Aff18">
<OrgID Level="Institution" Type="GRID">grid.457353.3</OrgID>
<OrgID Level="Institution" Type="ISNI">0000000114113805</OrgID>
<OrgName>LORIA & INRIA Nancy – Grand-Est</OrgName>
<OrgAddress>
<Country>France</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff19">
<OrgID Level="Institution" Type="GRID">grid.5328.c</OrgID>
<OrgID Level="Institution" Type="ISNI">0000000121863954</OrgID>
<OrgName>INRIA Paris – Rocquencourt</OrgName>
<OrgAddress>
<Country>France</Country>
</OrgAddress>
</Affiliation>
</AuthorGroup>
<Abstract ID="Abs1" Language="En">
<Heading>Abstract</Heading>
<Para>We present the first universally composable key-management functionality, formalized in the GNUC framework by Hofheinz and Shoup. It allows the enforcement of a wide range of security policies and can be extended by diverse key usage operations with no need to repeat the security proof. We illustrate its use by proving an implementation of a security token secure with respect to arbitrary key-usage operations and explore a proof technique that allows the storage of cryptographic keys externally, a novel development in simulation-based security frameworks.</Para>
</Abstract>
</ChapterHeader>
<NoBody></NoBody>
</Chapter>
</Part>
</Book>
</Series>
</Publisher>
<!-- Converted from LaTeX with LaTeX2A++ V3.1.38 --></istex:document>
</istex:metadataXml>
<mods version="3.6">
<titleInfo lang="en">
<title>Universally Composable Key-Management</title>
</titleInfo>
<titleInfo type="alternative" contentType="CDATA">
<title>Universally Composable Key-Management</title>
</titleInfo>
<name type="personal">
<namePart type="given">Steve</namePart>
<namePart type="family">Kremer</namePart>
<affiliation>LORIA & INRIA Nancy – Grand-Est, France</affiliation>
<role>
<roleTerm type="text">author</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Robert</namePart>
<namePart type="family">Künnemann</namePart>
<affiliation>INRIA Paris – Rocquencourt, France</affiliation>
<role>
<roleTerm type="text">author</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Graham</namePart>
<namePart type="family">Steel</namePart>
<affiliation>INRIA Paris – Rocquencourt, France</affiliation>
<role>
<roleTerm type="text">author</roleTerm>
</role>
</name>
<typeOfResource>text</typeOfResource>
<genre displayLabel="OriginalPaper" authority="ISTEX" authorityURI="https://content-type.data.istex.fr" type="conference" valueURI="https://content-type.data.istex.fr/ark:/67375/XTP-BFHXPBJJ-3">conference</genre>
<originInfo>
<publisher>Springer Berlin Heidelberg</publisher>
<place>
<placeTerm type="text">Berlin, Heidelberg</placeTerm>
</place>
<dateIssued encoding="w3cdtf">2013</dateIssued>
<copyrightDate encoding="w3cdtf">2013</copyrightDate>
</originInfo>
<language>
<languageTerm type="code" authority="rfc3066">en</languageTerm>
<languageTerm type="code" authority="iso639-2b">eng</languageTerm>
</language>
<abstract lang="en">Abstract: We present the first universally composable key-management functionality, formalized in the GNUC framework by Hofheinz and Shoup. It allows the enforcement of a wide range of security policies and can be extended by diverse key usage operations with no need to repeat the security proof. We illustrate its use by proving an implementation of a security token secure with respect to arbitrary key-usage operations and explore a proof technique that allows the storage of cryptographic keys externally, a novel development in simulation-based security frameworks.</abstract>
<relatedItem type="host">
<titleInfo>
<title>Computer Security – ESORICS 2013</title>
<subTitle>18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings</subTitle>
</titleInfo>
<name type="personal">
<namePart type="given">Jason</namePart>
<namePart type="family">Crampton</namePart>
<affiliation>Information Security Group, University of London, Royal Holloway, TW20 0EX, Egham Hill, Egham, UK</affiliation>
<affiliation>E-mail: jason.crampton@rhul.ac.uk</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Sushil</namePart>
<namePart type="family">Jajodia</namePart>
<affiliation>Center for Secure Information Systems, George Mason University, 4400 University Drive, 22030-4422, Fairfax, VA, USA</affiliation>
<affiliation>E-mail: jajodia@gmu.edu</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Keith</namePart>
<namePart type="family">Mayes</namePart>
<affiliation>Information Security Group, University of London, Royal Holloway, TW20 0EX, Egham Hill, Egham, UK</affiliation>
<affiliation>E-mail: keith.mayes@rhul.ac.uk</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<genre type="book-series" authority="ISTEX" authorityURI="https://publication-type.data.istex.fr" valueURI="https://publication-type.data.istex.fr/ark:/67375/JMC-0G6R5W5T-Z">book-series</genre>
<originInfo>
<publisher>Springer</publisher>
<copyrightDate encoding="w3cdtf">2013</copyrightDate>
<issuance>monographic</issuance>
</originInfo>
<subject>
<genre>Book-Subject-Collection</genre>
<topic authority="SpringerSubjectCodes" authorityURI="SUCO11645">Computer Science</topic>
</subject>
<subject>
<genre>Book-Subject-Group</genre>
<topic authority="SpringerSubjectCodes" authorityURI="SCI">Computer Science</topic>
<topic authority="SpringerSubjectCodes" authorityURI="SCI14050">Systems and Data Security</topic>
<topic authority="SpringerSubjectCodes" authorityURI="SCI15033">Data Encryption</topic>
<topic authority="SpringerSubjectCodes" authorityURI="SCI24067">Management of Computing and Information Systems</topic>
<topic authority="SpringerSubjectCodes" authorityURI="SCI26000">e-Commerce/e-business</topic>
<topic authority="SpringerSubjectCodes" authorityURI="SCI13022">Computer Communication Networks</topic>
</subject>
<identifier type="DOI">10.1007/978-3-642-40203-6</identifier>
<identifier type="ISBN">978-3-642-40202-9</identifier>
<identifier type="eISBN">978-3-642-40203-6</identifier>
<identifier type="ISSN">0302-9743</identifier>
<identifier type="eISSN">1611-3349</identifier>
<identifier type="BookTitleID">317997</identifier>
<identifier type="BookID">978-3-642-40203-6</identifier>
<identifier type="BookChapterCount">43</identifier>
<identifier type="BookVolumeNumber">8134</identifier>
<identifier type="BookSequenceNumber">8134</identifier>
<identifier type="PartChapterCount">4</identifier>
<part>
<date>2013</date>
<detail type="part">
<title>Formal Models and Methods</title>
</detail>
<detail type="volume">
<number>8134</number>
<caption>vol.</caption>
</detail>
<extent unit="pages">
<start>327</start>
<end>344</end>
</extent>
</part>
<recordInfo>
<recordOrigin>Springer-Verlag Berlin Heidelberg, 2013</recordOrigin>
</recordInfo>
</relatedItem>
<relatedItem type="series">
<titleInfo>
<title>Lecture Notes in Computer Science</title>
</titleInfo>
<name type="personal">
<namePart type="given">David</namePart>
<namePart type="family">Hutchison</namePart>
<affiliation>Lancaster University, Lancaster, UK</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Takeo</namePart>
<namePart type="family">Kanade</namePart>
<affiliation>Carnegie Mellon University, Pittsburgh, PA, USA</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Josef</namePart>
<namePart type="family">Kittler</namePart>
<affiliation>University of Surrey, Guildford, UK</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Jon</namePart>
<namePart type="given">M.</namePart>
<namePart type="family">Kleinberg</namePart>
<affiliation>Cornell University, Ithaca, NY, USA</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Friedemann</namePart>
<namePart type="family">Mattern</namePart>
<affiliation>ETH Zurich, Zurich, Switzerland</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">John</namePart>
<namePart type="given">C.</namePart>
<namePart type="family">Mitchell</namePart>
<affiliation>Stanford University, Stanford, CA, USA</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Moni</namePart>
<namePart type="family">Naor</namePart>
<affiliation>Weizmann Institute of Science, Rehovot, Israel</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Oscar</namePart>
<namePart type="family">Nierstrasz</namePart>
<affiliation>University of Bern, Bern, Switzerland</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">C.</namePart>
<namePart type="family">Pandu Rangan</namePart>
<affiliation>Indian Institute of Technology, Madras, India</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Bernhard</namePart>
<namePart type="family">Steffen</namePart>
<affiliation>University of Dortmund, Dortmund, Germany</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Madhu</namePart>
<namePart type="family">Sudan</namePart>
<affiliation>Massachusetts Institute of Technology, MA, USA</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Demetri</namePart>
<namePart type="family">Terzopoulos</namePart>
<affiliation>University of California, Los Angeles, CA, USA</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Doug</namePart>
<namePart type="family">Tygar</namePart>
<affiliation>University of California, Berkeley, CA, USA</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Moshe</namePart>
<namePart type="given">Y.</namePart>
<namePart type="family">Vardi</namePart>
<affiliation>Rice University, Houston, TX, USA</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Gerhard</namePart>
<namePart type="family">Weikum</namePart>
<affiliation>Max-Planck Institute of Computer Science, Saarbrücken, Germany</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<originInfo>
<publisher>Springer</publisher>
<copyrightDate encoding="w3cdtf">2013</copyrightDate>
<issuance>serial</issuance>
</originInfo>
<identifier type="ISSN">0302-9743</identifier>
<identifier type="eISSN">1611-3349</identifier>
<identifier type="SeriesID">558</identifier>
<recordInfo>
<recordOrigin>Springer-Verlag Berlin Heidelberg, 2013</recordOrigin>
</recordInfo>
</relatedItem>
<identifier type="istex">AF2EF7C2028EB3DB0F74AD6E90BA96DA72178F4F</identifier>
<identifier type="ark">ark:/67375/HCB-KL61J475-M</identifier>
<identifier type="DOI">10.1007/978-3-642-40203-6_19</identifier>
<identifier type="ChapterID">19</identifier>
<identifier type="ChapterID">Chap19</identifier>
<accessCondition type="use and reproduction" contentType="copyright">Springer-Verlag Berlin Heidelberg, 2013</accessCondition>
<recordInfo>
<recordContentSource authority="ISTEX" authorityURI="https://loaded-corpus.data.istex.fr" valueURI="https://loaded-corpus.data.istex.fr/ark:/67375/XBH-RLRX46XW-4">springer</recordContentSource>
<recordOrigin>Springer-Verlag Berlin Heidelberg, 2013</recordOrigin>
</recordInfo>
</mods>
<json:item>
<extension>json</extension>
<original>false</original>
<mimetype>application/json</mimetype>
<uri>https://api.istex.fr/ark:/67375/HCB-KL61J475-M/record.json</uri>
</json:item>
</metadata>
<annexes>
<json:item>
<extension>xml</extension>
<original>true</original>
<mimetype>application/xml</mimetype>
<uri>https://api.istex.fr/ark:/67375/HCB-KL61J475-M/annexes.xml</uri>
</json:item>
</annexes>
</istex>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Wicri/Lorraine/explor/InforLorV4/Data/Istex/Corpus
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 002955 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/Istex/Corpus/biblio.hfd -nk 002955 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Wicri/Lorraine
   |area=    InforLorV4
   |flux=    Istex
   |étape=   Corpus
   |type=    RBID
   |clé=     ISTEX:AF2EF7C2028EB3DB0F74AD6E90BA96DA72178F4F
   |texte=   Universally Composable Key-Management
}}

Wicri

This area was generated with Dilib version V0.6.33.
Data generation: Mon Jun 10 21:56:28 2019. Site generation: Fri Feb 25 15:29:27 2022