link.springer.com/article/10.1007/s10703-013-0184-6

Preview meta tags from the link.springer.com website.

Linked Hostnames

24

Thumbnail

Search Engine Appearance

Google

https://link.springer.com/article/10.1007/s10703-013-0184-6

Composition of password-based protocols - Formal Methods in System Design

Formal and symbolic techniques are extremely useful for modelling and analysing security protocols. They have helped to improve our understanding of such p



Bing

Composition of password-based protocols - Formal Methods in System Design

https://link.springer.com/article/10.1007/s10703-013-0184-6

Formal and symbolic techniques are extremely useful for modelling and analysing security protocols. They have helped to improve our understanding of such p



DuckDuckGo

https://link.springer.com/article/10.1007/s10703-013-0184-6

Composition of password-based protocols - Formal Methods in System Design

Formal and symbolic techniques are extremely useful for modelling and analysing security protocols. They have helped to improve our understanding of such p

  • General Meta Tags

    115
    • title
      Composition of password-based protocols | Formal Methods in System Design
    • charset
      UTF-8
    • X-UA-Compatible
      IE=edge
    • applicable-device
      pc,mobile
    • viewport
      width=device-width, initial-scale=1
  • Open Graph Meta Tags

    6
    • og:url
      https://link.springer.com/article/10.1007/s10703-013-0184-6
    • og:type
      article
    • og:site_name
      SpringerLink
    • og:title
      Composition of password-based protocols - Formal Methods in System Design
    • og:description
      Formal and symbolic techniques are extremely useful for modelling and analysing security protocols. They have helped to improve our understanding of such protocols, allowed us to discover flaws, and they also provide support for protocol design. However, such analyses usually consider that the protocol is executed in isolation or assume a bounded number of protocol sessions. Hence, no security guarantee is provided when the protocol is executed in a more complex environment.In this paper, we study whether password protocols can be safely composed, even when a same password is reused. More precisely, we present a transformation which maps a password protocol that is secure for a single protocol session (a decidable problem) to a protocol that is secure for an unbounded number of sessions. Our result provides an effective strategy to design secure password protocols: (i) design a protocol intended to be secure for one protocol session; (ii) apply our transformation and obtain a protocol which is secure for an unbounded number of sessions. Our technique also applies to compose different password protocols allowing us to obtain both inter-protocol and inter-session composition.
  • Twitter Meta Tags

    6
    • twitter:site
      @SpringerLink
    • twitter:card
      summary_large_image
    • twitter:image:alt
      Content cover image
    • twitter:title
      Composition of password-based protocols
    • twitter:description
      Formal Methods in System Design - Formal and symbolic techniques are extremely useful for modelling and analysing security protocols. They have helped to improve our understanding of such...
  • Item Prop Meta Tags

    3
    • position
      1
    • position
      2
    • position
      3
  • Link Tags

    9
    • apple-touch-icon
      /oscar-static/img/favicons/darwin/apple-touch-icon-6ef0829b9c.png
    • canonical
      https://link.springer.com/article/10.1007/s10703-013-0184-6
    • icon
      /oscar-static/img/favicons/darwin/android-chrome-192x192.png
    • icon
      /oscar-static/img/favicons/darwin/favicon-32x32.png
    • icon
      /oscar-static/img/favicons/darwin/favicon-16x16.png

Emails

1

Links

120