Sciweavers

ASIAN
2006
Springer
116views Algorithms» more  ASIAN 2006»
13 years 8 months ago
Secrecy Analysis in Protocol Composition Logic
We present formal proof rules for inductive reasoning about the way that data transmitted on the network remains secret from a malicious attacker. Extending a compositional protoco...
Arnab Roy, Anupam Datta, Ante Derek, John C. Mitch...
ASIAN
2006
Springer
134views Algorithms» more  ASIAN 2006»
13 years 8 months ago
Computational Soundness of Formal Indistinguishability and Static Equivalence
In the investigation of the relationship between the formal and the computational view of cryptography, a recent approach, first proposed in [10], uses static equivalence from cryp...
Gergei Bana, Payman Mohassel, Till Stegers
ASIAN
2006
Springer
104views Algorithms» more  ASIAN 2006»
13 years 8 months ago
Closing Internal Timing Channels by Transformation
Abstract. A major difficulty for tracking information flow in multithreaded programs is due to the internal timing covert channel. Information is leaked via this channel when secre...
Alejandro Russo, John Hughes, David A. Naumann, An...
ASIAN
2006
Springer
152views Algorithms» more  ASIAN 2006»
13 years 8 months ago
Inferring Disjunctive Postconditions
Polyhedral analysis [9] is an abstract interpretation used for automatic discovery of invariant linear inequalities among numerical varia program. Convexity of this abstract domain...
Corneliu Popeea, Wei-Ngan Chin
ASIAN
2006
Springer
133views Algorithms» more  ASIAN 2006»
13 years 8 months ago
Normal Proofs in Intruder Theories
Given an arbitrary intruder deduction capability, modeled as an inference system S and a protocol, we show how to compute an inference system bS such that the security problem for ...
Vincent Bernat, Hubert Comon-Lundh
ASIAN
2006
Springer
76views Algorithms» more  ASIAN 2006»
13 years 8 months ago
Responsiveness in Process Calculi
Abstract. In a process calculus, an agent guarantees responsive usage of a channel name r if a communication along r is guaranteed to eventually take place. Responsiveness is impor...
Lucia Acciai, Michele Boreale
ASIAN
2006
Springer
131views Algorithms» more  ASIAN 2006»
13 years 8 months ago
FORM : A Federated Rights Expression Model for Open DRM Frameworks
Abstract. Digital Rights Management frameworks (DRM) aim at protecting and controlling information contents widely distributed on client devices. Using a license, the content provi...
Thierry Sans, Frédéric Cuppens, Nora...