196 research outputs found

    v. 68, issue 11, April 6, 2001

    Get PDF

    The Chronicle [March 4, 2002]

    Get PDF
    The Chronicle, March 4, 2002https://repository.stcloudstate.edu/chron/4533/thumbnail.jp

    A comprehensive, formal and automated analysis of the EDHOC protocol

    Get PDF
    International audienceEDHOC is a key exchange proposed by IETF's Lightweight Authenticated Key Exchange (LAKE) Working Group (WG). Its design focuses on small message sizes to be suitable for constrained IoT communication technologies. In this paper we provide an in-depth formal analysis of EDHOC-draft version 12, taking into account the different proposed authentication methods and various options. For our analysis we use the SAPIC + protocol platform that allows to compile a single specification to 3 state-of-the-art protocol verification tools (PROVERIF, TAMARIN and DEEPSEC) and take advantage of the strengths of each of the tools. In our analysis we consider a large variety of compromise scenarios, and also exploit recent results that allow to model existing weaknesses in cryptographic primitives, relaxing the perfect cryptography assumption, common in symbolic analysis. While our analysis confirmed security for the most basic threat models, a number of weaknesses were uncovered in the current design when more advanced threat models were taken into account. These weaknesses have been acknowledged by the LAKE WG and the mitigations we propose (and prove secure) have been included in version 14 of the draft

    Awards and Special Recognitions Committee 1997-1998

    Get PDF
    The records of the Administrative Staff Council (UA-022) are available in print in the Center for Archival Collections

    The Ithacan, 2001-03-01

    Get PDF
    https://digitalcommons.ithaca.edu/ithacan_2000-01/1020/thumbnail.jp

    Central Florida Future, Vol. 38 No. 64, April 27, 2006

    Get PDF
    https://stars.library.ucf.edu/centralfloridafuture/2903/thumbnail.jp

    Principles of Security and Trust

    Get PDF
    This open access book constitutes the proceedings of the 8th International Conference on Principles of Security and Trust, POST 2019, which took place in Prague, Czech Republic, in April 2019, held as part of the European Joint Conference on Theory and Practice of Software, ETAPS 2019. The 10 papers presented in this volume were carefully reviewed and selected from 27 submissions. They deal with theoretical and foundational aspects of security and trust, including on new theoretical results, practical applications of existing foundational ideas, and innovative approaches stimulated by pressing practical problems

    The Chronicle [April 17, 2000]

    Get PDF
    The Chronicle, April 17, 2000https://repository.stcloudstate.edu/chron/4435/thumbnail.jp
    corecore