Sciweavers

JCS
2010
80views more  JCS 2010»
12 years 11 months ago
Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols
We introduce constraint differentiation, a powerful technique for reducing search when model-checking security protocols using constraint-based methods. Constraint differentiation...
Sebastian Mödersheim, Luca Viganò, Dav...
JCS
2010
151views more  JCS 2010»
12 years 11 months ago
Biometric template protection in multimodal authentication systems based on error correcting codes
Savvas Argyropoulos, Dimitrios Tzovaras, Dimosthen...
JCS
2010
112views more  JCS 2010»
13 years 3 months ago
Inductive trace properties for computational security
Protocol authentication properties are generally trace-based, meaning that authentication holds for the protocol if authentication holds for individual traces (runs of the protoco...
Arnab Roy, Anupam Datta, Ante Derek, John C. Mitch...
JCS
2010
121views more  JCS 2010»
13 years 3 months ago
Computational soundness of symbolic zero-knowledge proofs
raction of cryptographic operations by term algebras, called Dolev-Yao models, is essential in almost all tool-supported methods for proving security protocols. Recently significa...
Michael Backes, Dominique Unruh
JCS
2010
64views more  JCS 2010»
13 years 3 months ago
Finite models for formal security proofs
Jean Goubault-Larrecq
JCS
2010
124views more  JCS 2010»
13 years 3 months ago
Verifying resource access control on mobile interactive devices
A model of resource access control is presented in which the access control to resources can employ user interaction to obtain the necessary permissions. This model is inspired by...
Frédéric Besson, Guillaume Dufay, Th...
JCS
2010
61views more  JCS 2010»
13 years 3 months ago
Formal security analysis of PKCS#11 and proprietary extensions
Stéphanie Delaune, Steve Kremer, Graham Ste...
JCS
2010
82views more  JCS 2010»
13 years 3 months ago
Independence from obfuscation: A semantic framework for diversity
Riccardo Pucella, Fred B. Schneider