Serveur d'exploration sur la télématique

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

Non Interference for the Analysis of Cryptographic Protocols

Identifieur interne : 004023 ( Main/Exploration ); précédent : 004022; suivant : 004024

Non Interference for the Analysis of Cryptographic Protocols

Auteurs : Riccardo Focardi [Italie] ; Roberto Gorrieri [Italie] ; Fabio Martinelli [Italie]

Source :

RBID : ISTEX:2CB464D2A4FD1C56F94F09571AE2D2ECBE8CD219

Abstract

Abstract: Many security properties of cryptographic protocols can be all seen as specific instances of a general property, we called Non Deducibility on Composition (NDC), that we proposed a few years ago for studying information flow properties in computer systems. The advantage of our unifying theory is that formal comparison among these properties is now easier and that the full generality of NDC has helped us in finding a few new attacks on cryptographic protocols.

Url:
DOI: 10.1007/3-540-45022-X_31


Affiliations:


Links toward previous steps (curation, corpus...)


Le document en format XML

<record>
<TEI wicri:istexFullTextTei="biblStruct">
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en">Non Interference for the Analysis of Cryptographic Protocols</title>
<author>
<name sortKey="Focardi, Riccardo" sort="Focardi, Riccardo" uniqKey="Focardi R" first="Riccardo" last="Focardi">Riccardo Focardi</name>
</author>
<author>
<name sortKey="Gorrieri, Roberto" sort="Gorrieri, Roberto" uniqKey="Gorrieri R" first="Roberto" last="Gorrieri">Roberto Gorrieri</name>
</author>
<author>
<name sortKey="Martinelli, Fabio" sort="Martinelli, Fabio" uniqKey="Martinelli F" first="Fabio" last="Martinelli">Fabio Martinelli</name>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:2CB464D2A4FD1C56F94F09571AE2D2ECBE8CD219</idno>
<date when="2000" year="2000">2000</date>
<idno type="doi">10.1007/3-540-45022-X_31</idno>
<idno type="url">https://api.istex.fr/document/2CB464D2A4FD1C56F94F09571AE2D2ECBE8CD219/fulltext/pdf</idno>
<idno type="wicri:Area/Istex/Corpus">003154</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Corpus" wicri:corpus="ISTEX">003154</idno>
<idno type="wicri:Area/Istex/Curation">003154</idno>
<idno type="wicri:Area/Istex/Checkpoint">002F17</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Checkpoint">002F17</idno>
<idno type="wicri:doubleKey">0302-9743:2000:Focardi R:non:interference:for</idno>
<idno type="wicri:Area/Main/Merge">004111</idno>
<idno type="wicri:Area/Main/Curation">004023</idno>
<idno type="wicri:Area/Main/Exploration">004023</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title level="a" type="main" xml:lang="en">Non Interference for the Analysis of Cryptographic Protocols</title>
<author>
<name sortKey="Focardi, Riccardo" sort="Focardi, Riccardo" uniqKey="Focardi R" first="Riccardo" last="Focardi">Riccardo Focardi</name>
<affiliation wicri:level="1">
<country xml:lang="fr">Italie</country>
<wicri:regionArea>Dipartimento di Informatica, Universitá Ca’ Foscari di Venezia</wicri:regionArea>
<wicri:noRegion>Universitá Ca’ Foscari di Venezia</wicri:noRegion>
</affiliation>
<affiliation wicri:level="1">
<country wicri:rule="url">Italie</country>
</affiliation>
</author>
<author>
<name sortKey="Gorrieri, Roberto" sort="Gorrieri, Roberto" uniqKey="Gorrieri R" first="Roberto" last="Gorrieri">Roberto Gorrieri</name>
<affiliation wicri:level="4">
<country xml:lang="fr">Italie</country>
<wicri:regionArea>Dipartimento di Scienze dell’Informazione, Universitá di Bologna</wicri:regionArea>
<placeName>
<settlement type="city">Bologne</settlement>
<region nuts="2" type="region">Émilie-Romagne</region>
</placeName>
<orgName type="university">Université de Bologne</orgName>
</affiliation>
<affiliation wicri:level="1">
<country wicri:rule="url">Italie</country>
</affiliation>
</author>
<author>
<name sortKey="Martinelli, Fabio" sort="Martinelli, Fabio" uniqKey="Martinelli F" first="Fabio" last="Martinelli">Fabio Martinelli</name>
<affiliation wicri:level="3">
<country xml:lang="fr">Italie</country>
<wicri:regionArea>Istituto per le Applicazioni Telematiche C.N.R., Pisa</wicri:regionArea>
<placeName>
<settlement type="city">Pise</settlement>
<region nuts="2">Toscane</region>
</placeName>
</affiliation>
<affiliation wicri:level="1">
<country wicri:rule="url">Italie</country>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series>
<title level="s">Lecture Notes in Computer Science</title>
<imprint>
<date>2000</date>
</imprint>
<idno type="ISSN">0302-9743</idno>
<idno type="ISSN">0302-9743</idno>
</series>
<idno type="istex">2CB464D2A4FD1C56F94F09571AE2D2ECBE8CD219</idno>
<idno type="DOI">10.1007/3-540-45022-X_31</idno>
<idno type="ChapterID">31</idno>
<idno type="ChapterID">Chap31</idno>
</biblStruct>
</sourceDesc>
<seriesStmt>
<idno type="ISSN">0302-9743</idno>
</seriesStmt>
</fileDesc>
<profileDesc>
<textClass></textClass>
<langUsage>
<language ident="en">en</language>
</langUsage>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">Abstract: Many security properties of cryptographic protocols can be all seen as specific instances of a general property, we called Non Deducibility on Composition (NDC), that we proposed a few years ago for studying information flow properties in computer systems. The advantage of our unifying theory is that formal comparison among these properties is now easier and that the full generality of NDC has helped us in finding a few new attacks on cryptographic protocols.</div>
</front>
</TEI>
<affiliations>
<list>
<country>
<li>Italie</li>
</country>
<region>
<li>Toscane</li>
<li>Émilie-Romagne</li>
</region>
<settlement>
<li>Bologne</li>
<li>Pise</li>
</settlement>
<orgName>
<li>Université de Bologne</li>
</orgName>
</list>
<tree>
<country name="Italie">
<noRegion>
<name sortKey="Focardi, Riccardo" sort="Focardi, Riccardo" uniqKey="Focardi R" first="Riccardo" last="Focardi">Riccardo Focardi</name>
</noRegion>
<name sortKey="Focardi, Riccardo" sort="Focardi, Riccardo" uniqKey="Focardi R" first="Riccardo" last="Focardi">Riccardo Focardi</name>
<name sortKey="Gorrieri, Roberto" sort="Gorrieri, Roberto" uniqKey="Gorrieri R" first="Roberto" last="Gorrieri">Roberto Gorrieri</name>
<name sortKey="Gorrieri, Roberto" sort="Gorrieri, Roberto" uniqKey="Gorrieri R" first="Roberto" last="Gorrieri">Roberto Gorrieri</name>
<name sortKey="Martinelli, Fabio" sort="Martinelli, Fabio" uniqKey="Martinelli F" first="Fabio" last="Martinelli">Fabio Martinelli</name>
<name sortKey="Martinelli, Fabio" sort="Martinelli, Fabio" uniqKey="Martinelli F" first="Fabio" last="Martinelli">Fabio Martinelli</name>
</country>
</tree>
</affiliations>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Ticri/CIDE/explor/TelematiV1/Data/Main/Exploration
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 004023 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/Main/Exploration/biblio.hfd -nk 004023 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Ticri/CIDE
   |area=    TelematiV1
   |flux=    Main
   |étape=   Exploration
   |type=    RBID
   |clé=     ISTEX:2CB464D2A4FD1C56F94F09571AE2D2ECBE8CD219
   |texte=   Non Interference for the Analysis of Cryptographic Protocols
}}

Wicri

This area was generated with Dilib version V0.6.31.
Data generation: Thu Nov 2 16:09:04 2017. Site generation: Sun Mar 10 16:42:28 2024