Detecting the misuse of secrets : foundations, protocols, and verification
Secrets are the basis of most protocol security, enabling authentication and secrecy over untrusted channels even in the presence of active adversaries. The compromise and misuse of secrets can therefore undermine the properties that people and systems rely on for their security. In this thesis, we...
Main Author: | Milner, Kevin |
---|---|
Other Authors: | Cremers, Cas |
Published: |
University of Oxford
2018
|
Online Access: | https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.757805 |
Similar Items
-
The Competitions between Trade Secret Protection and the Misuse of Trade Secret Protection
by: Chen, Hsi Chung, et al.
Published: (2016) -
Misuse of medication in adult substance misuse services: a systematic review protocol
by: Ian Maidment, et al.
Published: (2021-06-01) - Misuse Patterns for the SSL/TLS Protocol
-
Toolkit for detecting misused epidemiological methods
by: Colin L. Soskolne, et al.
Published: (2021-08-01) -
Detecting growth hormone misuse in athletes
by: Richard I. G. Holt
Published: (2013-01-01)