Back to Results
First PageMeta Content
Dolev-Yao model / Secure multi-party computation / Cryptographic primitive / Formal verification / Communications protocol / Transport Layer Security / Authentication protocol / Secure channel / Random oracle / Cryptography / Cryptographic protocols / Universal composability


Report on DIMACS∗ Workshop on Security Analysis of Protocols Date of workshop: June 7 – 9, 2004 Workshop Organizers: John Mitchell, Stanford University Ran Canetti, IBM Watson
Add to Reading List

Document Date: 2005-07-27 15:21:45


Open Document

File Size: 131,35 KB

Share Result on Facebook

City

Automata / /

Company

IBM / AT&T Labs / Bell Labs / Avaya Labs / Communicating Systems / Telcordia Technologies / Needham / HP Labs / NEC Laboratories America / Microsoft / /

Country

Italy / /

Event

Business Partnership / FDA Phase / /

Facility

Princeton University / Stevens Institute of Technology / University of Pennsylvania First / Stevens Institute of Technology Date / University of Pennsylvania In / Rutgers University / /

IndustryTerm

recursive authentication protocol / secure protocols / synchronous systems / public key protocol / documented ideal protocol / generic algorithm / ordinary ideal protocol / bit commitment protocols / technique to more complex protocols / recursive protocols / interactive generic algorithm / shared-key communication protocol / arbitrary protocols / formal proof systems / cryptographic protocols / symbolic protocol / secure protocol / symbolic search / selective processing countermeasures / higher level application protocol / application protocols / communication protocols / electronic commerce protocol / security protocols / simpler/more efficient protocols / web services / /

OperatingSystem

DoS / /

Organization

University of Pennsylvania In / National Science Foundation / University of Pennsylvania / MIT / Rutgers University / Princeton University / Stevens Institute of Technology / SUNY / Zhiqiang Yang Department of Computer Science / University of Newcastle / UCSD / Stanford University / Institute of Technology Date of Report / University of Pennsylvania First / /

Person

Manoj Prabhakaran / Nancy Lynch / John Mitchell / Dominic Mayers / Thomas Wilke / Jonathan Herzog / Andre Scedrov / Joshua D. Guttman / Radu Grosu / Daniele Micciancio / Sabrina Tarento / Birgit Pfitzmann / Coq / Ralf Kuesters / Peter Ryan / Carl A. Gunter / Yehuda Lindell / /

Position

Trusted Setup Speaker / general purpose proof assistant / Reactively Secure Dolev-Yao-Style Cryptographic Library Speaker / Stony Brook The speaker / Research The speaker / Simulation-based Security Speaker / speaker / Cryptographic Protocols Speaker / Recursive Cryptographic Protocols Speaker / Team Automata Speaker / Analyzing Security Protocols Using I/O Automata Speaker / proof assistant / MITRE The speaker / Availability Speaker / Cryptographically Sound Formal Analysis Speaker / Dolev-Yao model for automated proofs / TU Munich This speaker / Generic Model and the Random Oracle Model Speaker / Trust Speaker / CalTech The speaker / Protocol Analysis Speaker / Formal Encryption Speaker / Multiparty Protocols Speaker / Watson Report Author / Cryptoprotocols Speaker / Protocols Speaker / Kiel The speaker / /

Product

UC / /

ProvinceOrState

Pennsylvania / /

Technology

no secure protocol / electronic commerce protocol / shared-key communication protocol / two security protocols / bit commitment protocols / key exchange protocols / generic algorithm / security protocols / recursive authentication protocol / analyzing security protocols / interactive generic algorithm / symbolic protocol / ElGamal encryption / encryption / application protocols / cryptography / public key protocol / Diffie-Hellman key distribution protocol / Transmission Control Protocol / simulation / communication protocols / higher level application protocol / Yahalom protocols / /

SocialTag