Explore the words cloud of the SPOOC project. It provides you a very rough idea of what is the project "SPOOC" about.
The following table provides information about the project.
Coordinator |
INSTITUT NATIONAL DE RECHERCHE ENINFORMATIQUE ET AUTOMATIQUE
Organization address contact info |
Coordinator Country | France [FR] |
Project website | https://members.loria.fr/skremer/files/spooc/index.html |
Total cost | 1˙903˙500 € |
EC max contribution | 1˙903˙500 € (100%) |
Programme |
1. H2020-EU.1.1. (EXCELLENT SCIENCE - European Research Council (ERC)) |
Code Call | ERC-2014-CoG |
Funding Scheme | ERC-COG |
Starting year | 2015 |
Duration (year-month-day) | from 2015-09-01 to 2020-08-31 |
Take a look of project's partnership.
# | ||||
---|---|---|---|---|
1 | INSTITUT NATIONAL DE RECHERCHE ENINFORMATIQUE ET AUTOMATIQUE | FR (LE CHESNAY CEDEX) | coordinator | 1˙903˙500.00 |
The rise of the Internet and the ubiquity of electronic devices has deeply changed our way of life. Many face to face and paper transactions have nowadays digital counterparts: home banking, e- commerce, e-voting, etc. The security of such transactions is ensured by the means of cryptographic protocols. While historically the main goals of protocols were to ensure confidentiality and authentication the situation has changed. The ability of people to stay connected constantly combined with ill-conceived systems seriously threatens people’s privacy. E-voting protocols need to guarantee privacy of votes, while ensuring transparency of the voting process; RFID and mobile telephone protocols have to guarantee that people cannot be traced. Moreover due to viruses and malware, personal computers and mobile phones must not be considered anymore to be trustworthy; yet they have to be used to execute protocols that need to achieve security goals. To detect flaws, prove the security of protocols and propose new design principles the Spooc project will develop solid foundations and practical tools to analyze and formally prove security properties that ensure the privacy of users as well as techniques for executing protocols on untrusted platforms. We will
- develop foundations and practical tools for specifying and formally verifying new security properties, in particular privacy properties;
- develop techniques for the design and automated analysis of protocols that have to be executed on untrusted platforms;
- apply these methods in particular to novel e-voting protocols, which aim at guaranteeing strong security guarantees without need to trust the voter client software.
The Spooc project will significantly advance formal verification of security protocols and contribute to the development of a rich framework that provides techniques and tools to analyze and design security protocols guaranteeing user’s privacy and relaxing trust assumptions on the execution platforms.
year | authors and title | journal | last update |
---|---|---|---|
2020 |
Rémy Chrétien, Véronique Cortier, Antoine Dallon, Stéphanie Delaune Typing Messages for Free in Security Protocols published pages: 1-52, ISSN: 1529-3785, DOI: 10.1145/3343507 |
ACM Transactions on Computational Logic 21/1 | 2020-04-24 |
2017 |
Babel , Kushal; Cheval , Vincent; Kremer , Steve On communication models when verifying equivalence properties published pages: , ISSN: , DOI: 10.1007/978-3-662-54455-6_7 |
6th International Conference on Principles of Security and Trust (POST), Apr 2017, Uppsala, Sweden 3 | 2019-05-30 |
2017 |
Serdar Erbatur, Andrew M. Marshall, Christophe Ringeissen Notions of Knowledge in Combinations of Theories Sharing Constructors published pages: 60-76, ISSN: , DOI: 10.1007/978-3-319-63046-5_5 |
26th International Conference on Automated Deduction (CADE\'17) | 2019-05-30 |
2016 |
Voegtlin, Thomas; Turuani, Mathieu; Rusinowitch, Michael Automated Verification of Electrum Wallet published pages: , ISSN: , DOI: 10.1007/978-3-662-53357-4_3 |
3rd Workshop on Bitcoin and Blockchain Research annual | 2019-05-30 |
2016 |
Kremer, Steve; Ciobâcǎ, Ştefan; Chadha, Rohit; Cheval, Vincent Automated verification of equivalence properties of cryptographic protocols published pages: 1--32, ISSN: 1529-3785, DOI: 10.1145/2926715 |
ACM Transactions on Computational Logic (TOCL) Volume 17 Issue 4 | 2019-05-30 |
2017 |
Gazeau , Ivan; Kremer , Steve Automated analysis of equivalence properties for security protocols using else branches published pages: , ISSN: , DOI: |
22nd European Symposium on Research in Computer Security (ESORICS\'17), 2017, Oslo, Norway. Springer, 2017 14 | 2019-05-30 |
2018 |
Véronique Cortier, Niklas Grimm, Joseph Lallemand, Matteo Maffei Equivalence properties by typing in cryptographic branching protocols published pages: 160-187, ISSN: , DOI: 10.1007/978-3-319-89722-6_7 |
7th International Conference on Principles of Security and Trust (POST\'18) | 2019-05-30 |
2016 |
Steve Kremer, Robert Künnemann Automated analysis of security protocols with global state published pages: 583-616, ISSN: 0926-227X, DOI: 10.3233/JCS-160556 |
Journal of Computer Security 24/5 | 2019-05-30 |
2018 |
Vincent Cheval, Steve Kremer, Itsaka Rakotonirina DEEPSEC: Deciding Equivalence Properties in Security Protocols -- Theory and Practice, published pages: , ISSN: , DOI: |
2018 IEEE Symposium on Security and Privacy (SP) | 2019-05-30 |
2016 |
Kremer, Steve; Cortier, Véronique; Arapinis, Myrto When Are Three Voters Enough for Privacy Properties? published pages: , ISSN: , DOI: 10.1007/978-3-319-45741-3_13 |
Computer Security – ESORICS 2016 : 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part II . Lecture Notes in Computer Science , vol. 9879 , Springer International Publishing , pp. 241-260 . DOI: 10.1007/978-3-319-45741-3_13 annual | 2019-05-30 |
2017 |
Dreier , Jannik; Duménil , Charles; Kremer , Steve; Sasse , Ralf Beyond Subterm-Convergent Equational Theories in Automated Verification of Stateful Protocols published pages: , ISSN: , DOI: 10.1007/978-3-662-54455-6_6 |
\"POST 2017 - 6th International Conference on Principles of Security and Trust, Apr 2017, Uppsala, Sweden. Springer, Security and Cryptology, 10204, pp.117-140, Principles of Security and Trust. 〈http://www.etaps.org/2017/post〉\" 3 | 2019-05-30 |
2017 |
Scerri, Guillaume; Kremer, Steve; Jacomme, Charlie Symbolic Models for Isolated Execution Environments published pages: , ISSN: , DOI: |
2nd IEEE European Symposium on Security and Privacy (EuroSP\'17), Apr 2017, Paris, France annual | 2019-05-30 |
2016 |
Cortier, Véronique; Galindo, David; Chaidos, Pyrros; Fuchsbauer, Georg BeleniosRF: A Non-interactive Receipt-Free Electronic Voting Scheme published pages: , ISSN: , DOI: 10.1145/2976749.2978337 |
23rd ACM Conference on Computer and Communications Security (CCS\'16), Oct 2016, Vienna, Austria. 2016, <10.1145/2976749.2978337> annual | 2019-05-30 |
2018 |
Véronique Cortier, Antoine Dallon, Stéphanie Delaune Efficiently deciding equivalence for standard primitives and phases published pages: 491-511, ISSN: , DOI: 10.1007/978-3-319-99073-6_24 |
Proceedings of the 23rd European Symposium on Research in Computer Security, Part I (ESORICS\'18) | 2019-05-30 |
2018 |
Vincent Cheval, Steve Kremer, Itsaka Rakotonirina The DEEPSEC prover published pages: 28-36, ISSN: , DOI: 10.1007/978-3-319-96142-2_4 |
30th International Conference on Computer Aided Verification, Part II (CAV\'18) | 2019-05-30 |
Are you the coordinator (or a participant) of this project? Plaese send me more information about the "SPOOC" project.
For instance: the website url (it has not provided by EU-opendata yet), the logo, a more detailed description of the project (in plain text as a rtf file or a word file), some pictures (as picture files, not embedded into any word file), twitter account, linkedin page, etc.
Send me an email (fabio@fabiodisconzi.com) and I put them in your project's page as son as possible.
Thanks. And then put a link of this page into your project's website.
The information about "SPOOC" are provided by the European Opendata Portal: CORDIS opendata.