Sciweavers

1906 search results - page 174 / 382
» Data Privacy
Sort
View
CSFW
2005
IEEE
15 years 9 months ago
An Encapsulated Authentication Logic for Reasoning about Key Distribution Protocols
Authentication and secrecy properties are proved by very different methods: the former by local reasoning, leading to matching knowledge of all principals about the order of their...
Iliano Cervesato, Catherine Meadows, Dusko Pavlovi...
121
Voted
ACSAC
1999
IEEE
15 years 8 months ago
Security Policy Coordination for Heterogeneous Information Systems
Coordinating security policies in information enclaves is challenging due to their heterogeneity and autonomy. Administrators must reconcile the semantic diversity of data and sec...
John Hale, Pablo Galiasso, Mauricio Papa, Sujeet S...
132
Voted
ESORICS
1998
Springer
15 years 7 months ago
Side Channel Cryptanalysis of Product Ciphers
Building on the work of Kocher[Koc96], Jaffe, and Yun [KJY98], we discuss the notion of side-channel cryptanalysis: cryptanalysis using implementation data. We discuss the notion o...
John Kelsey, Bruce Schneier, David Wagner, Chris H...
115
Voted
AGENTS
1997
Springer
15 years 7 months ago
Real-Time Control of Attention and Behavior in a Logical Framework
We describe a uniform technique for representing both sensory data and the attentional state of an agent using a subset of modal logic with indexicals. The resulting representatio...
Ian Horswill
152
Voted
OOPSLA
1993
Springer
15 years 7 months ago
Object Fault Handling for Persistent Programming Languages: A Performance Evaluation
A key mechanism of a persistent programming language is its ability to detect and handle references to non-resident objects. Ideally, this mechanism should be hidden from the prog...
Antony L. Hosking, J. Eliot B. Moss