Automatically detecting the misuse of secrets: foundations, design principles, and applications

We develop foundations and several constructions for security protocols that can automatically detect, without false positives, if a secret (such as a key or password) has been misused. Such constructions can be used, e.g., to automatically shut down compromised services, or to automatically revoke...

Szczegółowa specyfikacja

Opis bibliograficzny
Główni autorzy: Milner, K, Cremers, C, Yu, J, Ryan, M
Format: Conference item
Wydane: IEEE 2017