Sciweavers

18 search results - page 1 / 4
» esorics 2005
Sort
View
ESORICS
2005
Springer
13 years 10 months ago
Soundness of Formal Encryption in the Presence of Key-Cycles
Pedro Adão, Gergei Bana, Jonathan Herzog, A...
ESORICS
2005
Springer
13 years 10 months ago
Security Notions for Disk Encryption
We define security goals and attack models for disk encryption, and prove several relationships between the resulting security notions, and some general results about disk encryp...
Kristian Gjøsteen
ESORICS
2005
Springer
13 years 10 months ago
Security-Typed Languages for Implementation of Cryptographic Protocols: A Case Study
Security protocols are critical for protecting modern communication infrastructures and are therefore subject to thorough analysis. However practical implementations of these proto...
Aslan Askarov, Andrei Sabelfeld
ESORICS
2005
Springer
13 years 10 months ago
On Obligations
Access control is concerned with granting access to sensitive data based on conditions that relate to the past or present, so-called provisions. Expressing requirements from the do...
Manuel Hilty, David A. Basin, Alexander Pretschner
ESORICS
2005
Springer
13 years 10 months ago
Sanitizable Signatures
We introduce the notion of sanitizable signatures that offer many attractive security features for certain current and emerging applications. A sanitizable signature allows author...
Giuseppe Ateniese, Daniel H. Chou, Breno de Medeir...