Sciweavers

136
Voted
ESORICS
2000
Springer
15 years 7 months ago
Checking Secure Interactions of Smart Card Applets
Abstract. This paper presents an approach enabling a smart card issuer to verify that a new applet securely interacts with already downloaded applets. A security policy has been de...
Pierre Bieber, Jacques Cazin, Pierre Girard, Jean-...
105
Voted
ESORICS
2000
Springer
15 years 7 months ago
Authentication and Confidentiality via IPSEC
The IP security protocols (IPsec) may be used via security gateways that apply cryptographic operations to provide security services to datagrams, and this mode of use is supported...
Joshua D. Guttman, Amy L. Herzog, F. Javier Thayer
94
Voted
ESORICS
2000
Springer
15 years 7 months ago
Formal Verification of Cardholder Registration in SET
Giampaolo Bella, Fabio Massacci, Lawrence C. Pauls...
111
Voted
ESORICS
2000
Springer
15 years 7 months ago
Analysing Time Dependent Security Properties in CSP Using PVS
Neil Evans, Steve Schneider
125
Voted
ESOP
2000
Springer
15 years 7 months ago
Alias Types
Abstract. Linear type systems allow destructive operations such as object deallocation and imperative updates of functional data structures. These operations and others, such as th...
Frederick Smith, David Walker, J. Gregory Morriset...