Publication: L–PEP: a logic to reason about privacy–enhancing cryptography protocols
dc.affiliation.dpto | UC3M. Departamento de Informática | es |
dc.affiliation.grupoinv | UC3M. Grupo de Investigación: COSEC (Computer SECurity Lab) | es |
dc.contributor.author | Alcaide Raya, Almudena | |
dc.contributor.author | Abdallah, Ali | |
dc.contributor.author | González-Tablas Ferreres, Ana Isabel | |
dc.contributor.author | Fuentes, José María de | |
dc.date.accessioned | 2012-06-01T10:40:24Z | |
dc.date.available | 2012-06-01T10:40:24Z | |
dc.date.issued | 2011 | |
dc.description | Proceedings of: 5th International Workshop, DPM 2010 and 3rd International Workshop, SETOP 2010, Athens, Greece, September 23, 2010. | |
dc.description.abstract | In recent years, many cryptography protocols have been designed, for many different scenarios, with the purpose of preserving security of communications as well as privacy and anonymity of participant entities. In general, every proposed solution has possed a real challenge to the existing formal methods of protocol analysis and verification. The main goal of this work is the proposal of a logic to reason about privacy-enhancing monotonic and non-monotonic cryptography protocols. The new logic will be called L-PEP and it extends the existing Rubin's logic of beliefs. | |
dc.description.status | Publicado | |
dc.format.mimetype | application/pdf | |
dc.identifier.bibliographicCitation | Joaquín García-Alfaro et al. (eds.), Data privacy management and autonomous spontaneous security. 5th International Workshop, DPM 2010, and 3rd InternationalWorkshop, SETOP 2010, Athens, Greece, September 23, 2010 (pp. 108-122). Revised selected papers. Berlin: Springer, 2011 | |
dc.identifier.doi | 10.1007/978-3-642-19348-4_9 | |
dc.identifier.isbn | 978-3-642-19347-7 (Print) | |
dc.identifier.isbn | 978-3-642-19348-4 (Online) | |
dc.identifier.issn | 0302-9743 (Print) | |
dc.identifier.issn | 1611-3349 (Online) | |
dc.identifier.publicationfirstpage | 108 | |
dc.identifier.publicationlastpage | 122 | |
dc.identifier.publicationtitle | Data privacy management and autonomous spontaneous security: 5th International Workshop, DPM 2010, and 3rd International Workshop, SETOP 2010, Athens, Greece, September 23, 2010. Revised selected papers. | |
dc.identifier.uri | https://hdl.handle.net/10016/14434 | |
dc.language.iso | eng | |
dc.publisher | Springer | |
dc.relation.eventdate | September 23, 2010 | |
dc.relation.eventnumber | 5 | |
dc.relation.eventnumber | 3 | |
dc.relation.eventplace | Athens, Greece | |
dc.relation.eventtitle | International Workshop on Data Privacy Management International Workshop (DPM 2010) | |
dc.relation.eventtitle | International Workshop on Autonomous and Spontaneous Security (SETOP 2010) | |
dc.relation.ispartofseries | Lecture Notes in Computer Science, Security and Cryptology | |
dc.relation.ispartofseries | 6514 | |
dc.relation.publisherversion | http://dx.doi.org/10.1007/978-3-642-19348-4_9 | |
dc.rights | © Springer | |
dc.rights.accessRights | open access | |
dc.subject.eciencia | Informática | |
dc.subject.other | Non-monotonic cryptography protocols | |
dc.subject.other | Formal protocol verification | |
dc.subject.other | Privacy-enhancing protocols | |
dc.title | L–PEP: a logic to reason about privacy–enhancing cryptography protocols | |
dc.type | conference paper | * |
dc.type.hasVersion | AM | * |
dspace.entity.type | Publication |
Files
Original bundle
1 - 1 of 1