Non-collaborative Attackers and How and Where to Defend Vulnerable Security Protocols (Transcript of Discussion)

  • Luca ViganòEmail author
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8809)


Welcome back from the coffee break. Let me start by saying that this is joint work with two PhD students of mine at the University of Verona: Michele Peroli, who is in the audience, and Matteo Zavatteri. In the meantime, I have left Verona and am now at King’s College London, but we are still working together of course. I will also mention some of the previous work that we did with Maria-Camilla Fiazza, who is working at the University of Verona. In fact, she is working in robotics. I don’t know if I will have time to mention the collaboration that we did in detail at the end of the talk, but I would be most happy to tell you about how we can use at least some of the results that are common to robotics also for security and, in particular, how we can start reasoning about a new paradigm.


Security Protocol Security Property Coffee Break Topological Study Real Attack 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  1. 1.King’s College LondonLondonUK

Personalised recommendations