Sciweavers

405 search results - page 2 / 81
» Practice-Oriented Provable Security
Sort
View
ISCA
2011
IEEE
269views Hardware» more  ISCA 2011»
12 years 9 months ago
Crafting a usable microkernel, processor, and I/O system with strict and provable information flow security
High assurance systems used in avionics, medical implants, and cryptographic devices often rely on a small trusted base of hardware and software to manage the rest of the system. ...
Mohit Tiwari, Jason Oberg, Xun Li 0001, Jonathan V...
POST
2012
181views more  POST 2012»
12 years 25 days ago
Provably Repairing the ISO/IEC 9798 Standard for Entity Authentication
Abstract. We formally analyze the family of entity authentication protocols defined by the ISO/IEC 9798 standard and find numerous weaknesses, both old and new, including some th...
David A. Basin, Cas J. F. Cremers, Simon Meier
ICDE
2006
IEEE
115views Database» more  ICDE 2006»
14 years 6 months ago
Provable Security for Outsourcing Database Operations
Sergei Evdokimov, Matthias Fischmann, Oliver G&uum...
CCS
2006
ACM
13 years 9 months ago
Provably secure password-based authentication in TLS
Michel Abdalla, Emmanuel Bresson, Olivier Chevassu...