124
click to vote
ESORICS
15 years 6 months ago
2005 Springer
Abstract. Formal methods have been extensively applied to the certification of cryptographic protocols. However, most of these works make the perfect cryptography assumption, i.e....
102
Voted
ESORICS
15 years 6 months ago
2005 Springer
Security protocols are critical for protecting modern communication infrastructures and are therefore subject to thorough analysis. However practical implementations of these proto...
105
click to vote
ESORICS
15 years 6 months ago
2005 Springer
Abstract. Hippocratic Databases have been proposed as a mechanism to guarantee the respect of privacy principles in data management. We argue that three major principles are missin...
111
click to vote
ESORICS
15 years 6 months ago
2005 Springer
We introduce the notion of sanitizable signatures that offer many attractive security features for certain current and emerging applications. A sanitizable signature allows author...
119
click to vote
ESORICS
15 years 6 months ago
2005 Springer
Access control is concerned with granting access to sensitive data based on conditions that relate to the past or present, so-called provisions. Expressing requirements from the do...
|