License
When quoting this document, please refer to the following
DOI: 10.4230/LIPIcs.CSL.2020.1
URN: urn:nbn:de:0030-drops-116447
URL: https://drops.dagstuhl.de/opus/volltexte/2020/11644/
Go to the corresponding LIPIcs Volume Portal


Cortier, VĂ©ronique

Verification of Security Protocols (Invited Talk)

pdf-format:
LIPIcs-CSL-2020-1.pdf (0.2 MB)


Abstract

Cryptographic protocols aim at securing communications over insecure networks like the Internet. Over the past decades, numerous decision procedures and tools have been developed to automatically analyse the security of protocols. The field has now reached a good level of maturity with efficient techniques for the automatic security analysis of protocols After an overview of some famous protocols and flaws, we will describe the current techniques for security protocols analysis, often based on logic, and review the key challenges towards a fully automated verification.

BibTeX - Entry

@InProceedings{cortier:LIPIcs:2020:11644,
  author =	{V{\'e}ronique Cortier},
  title =	{{Verification of Security Protocols (Invited Talk)}},
  booktitle =	{28th EACSL Annual Conference on Computer Science Logic (CSL 2020)},
  pages =	{1:1--1:2},
  series =	{Leibniz International Proceedings in Informatics (LIPIcs)},
  ISBN =	{978-3-95977-132-0},
  ISSN =	{1868-8969},
  year =	{2020},
  volume =	{152},
  editor =	{Maribel Fern{\'a}ndez and Anca Muscholl},
  publisher =	{Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops.dagstuhl.de/opus/volltexte/2020/11644},
  URN =		{urn:nbn:de:0030-drops-116447},
  doi =		{10.4230/LIPIcs.CSL.2020.1},
  annote =	{Keywords: Security protocols, automated deduction, security}
}

Keywords: Security protocols, automated deduction, security
Seminar: 28th EACSL Annual Conference on Computer Science Logic (CSL 2020)
Issue Date: 2020
Date of publication: 10.01.2020


DROPS-Home | Fulltext Search | Imprint | Privacy Published by LZI