Sciweavers

Share
78 search results - page 1 / 16
» Towards secure integration of cryptographic software
Sort
View
OOPSLA
2015
Springer
3 years 4 months ago
Towards secure integration of cryptographic software
While cryptography is now readily available to everyone and can, provably, protect private information from attackers, we still frequently hear about major data leakages, many of ...
Steven Arzt, Sarah Nadi, Karim Ali, Eric Bodden, S...
CCS
2013
ACM
5 years 3 months ago
A security framework for the analysis and design of software attestation
Software attestation has become a popular and challenging research topic at many established security conferences with an expected strong impact in practice. It aims at verifying ...
Frederik Armknecht, Ahmad-Reza Sadeghi, Steffen Sc...
TCOS
2010
8 years 3 months ago
Green Secure Processors: Towards Power-Efficient Secure Processor Design
With the increasing wealth of digital information stored on computer systems today, security issues have become increasingly important. In addition to attacks targeting the softwar...
Siddhartha Chhabra, Yan Solihin
I3E
2001
196views Business» more  I3E 2001»
8 years 9 months ago
Security Modelling for Electronic Commerce: The Common Electronic Purse Specifications
: Designing security-critical systems correctly is very difficult. We present work on software engineering of security critical systems, supported by the CASE tool AUTOFOCUS. Secur...
Jan Jürjens, Guido Wimmel
FSTTCS
2003
Springer
9 years 1 months ago
A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol
We prove the Needham-Schroeder-Lowe public-key protocol secure under real, active cryptographic attacks including concurrent protocol runs. This proof is based on an abstract crypt...
Michael Backes, Birgit Pfitzmann
books