Back to Results
First PageMeta Content
Security / Secure communication / Internet standards / Computer network security / Transport Layer Security / Password / Public-key cryptography / HTTP Secure / Session hijacking / Cryptography / Cryptographic protocols / Computing


Keys to the Cloud: Formal Analysis and Concrete Attacks on Encrypted Web Storage Chetan Bansal1 , Karthikeyan Bhargavan2, Antoine Delignat-Lavaud2 , and Sergio Maffeis3, 1
Add to Reading List

Document Date: 2013-01-25 08:24:32


Open Document

File Size: 773,55 KB

Share Result on Facebook

City

Browser / London / /

Company

AES / LastPass / SpiderOak / CBC / /

Facility

Imperial College / WebSpi library / ProVerif library / /

IndustryTerm

login protocol / user devices / encrypted storage applications / web applications / security-conscious web applications / web users / storage server / usual solution / synchronization protocol / platform-specific software / public key infrastructure / web links / storage protocols / client software / few storage applications / web application / reference protocol / web vulnerabilities / web browser / derivation algorithm / ad hoc tracing tools / specific web page users / sign-on protocols / security-oriented web services / web attackers / File storage services / prevalent web vulnerabilities / web link / stolen devices / realistic web attacker model / web attack vectors / Web Cryptography We / web security library / encrypted storage services / securityconscious web applications / bank accounts / web storage applications / web-based attack / web servers / encrypted storage protocol / cryptographic protocols / web storage / et al. site / web-based attacks / Web Attacker Model An / Web Storage Chetan Bansal1 / cryptographic web applications / e-voting / web deployment / web attacks / security-conscious applications / cryptographic algorithms / cryptographic protocols underlying real-world web applications / Web Although / Web Security / sign-on applications / web authorization / Web authentication / web-based encrypted storage applications / web security mechanisms / storage services / web security analysis / Web Login / Application-layer protocols / /

Person

Sergio Ma / Gamal Integrity Metadata Integrity Sharing / /

Position

manager offers / ConfiChair / ConfiChair for conference management / /

Product

ProVerif / WebSpi / /

ProgrammingLanguage

HTML / JavaScript / /

Technology

public key infrastructure / HTTP protocol / client-side encryption / 2.1 An Encrypted Storage Protocol / 2.2 131 Deploying Encrypted Storage Protocols / Synchronization protocols / PKI / login protocol / electronic voting use client-side encryption / two protocols / Application-layer protocols / HTML / encrypted storage protocol / AJAX / sign-on protocols / Encryption / storage protocols / cryptography / reference protocol / public key / Java / key derivation algorithm / File Sharing / HTTP / synchronization protocol / cryptographic protocols / authenticated encryption / /

URL

http /

SocialTag