![]() |
![]() |
University of Birmingham > Talks@bham > Computer Security Seminars > Privacy issues: from protocols to applications
Privacy issues: from protocols to applicationsAdd to your list(s) Download to your calendar using vCal
If you have a question about this talk, please contact Vincent Cheval. Security protocols are nowadays used in many of our daily-life applications, and our privacy largely depends on their design. Formal verification techniques have proved their usefulness to analyse these protocols, but they become so complex that modular techniques have to be developed. We propose a generic composition result (in a Dolev-Yao model) to compose protocols with respect to privacy-type properties expressed using a notion of equivalence. We consider arbitrary primitives modeled using an equational theory, and a rich process algebra close to the applied pi calculus. Relying on this generic composition result, we are then able to derive some privacy-type properties (e.g. anonymity, unlinkability) of a whole application from a privacy analysis performed on each sub-protocol individually. As an application, we consider parallel composition and the case of key-exchange protocols. We illustrate our techniques on the mobile telecommunications application. This talk is part of the Computer Security Seminars series. This talk is included in these lists:
Note that ex-directory lists are not shown. |
Other listsCondensed Matter Physics Seminars Biosciences seminars EPS - College Research and KT Support ActivitiesOther talksUltrafast, all-optical, and highly efficient imaging of molecular chirality Sylow branching coefficients for symmetric groups Quantum simulations using ultra cold ytterbium TBC Modelling uncertainty in image analysis. TBC |