Automatically detecting the misuse of secrets: foundations, design principles, and applications
We develop foundations and several constructions for security protocols that can automatically detect, without false positives, if a secret (such as a key or password) has been misused. Such constructions can be used, e.g., to automatically shut down compromised services, or to automatically revoke...
Główni autorzy: | , , , |
---|---|
Format: | Conference item |
Wydane: |
IEEE
2017
|