Sciweavers

300 search results - page 4 / 60
» Formal Methods for Smartcard Security
Sort
View
ICIW
2007
IEEE
15 years 3 months ago
Analysis of Web Services Secure Conversation with Formal Methods
Web Services Secure Conversation extends Web Services Trust to provide mechanisms for establishing security consecurity context is an abstract concept that refers an authenticated...
M. Llanos Tobarra, Diego Cazorla, Fernando Cuarter...
CCS
2009
ACM
16 years 4 months ago
Formalizing information security knowledge
Unified and formal knowledge models of the information security domain are fundamental requirements for supporting and enhancing existing risk management approaches. This paper de...
Stefan Fenz, Andreas Ekelhart
158
Voted
ACSAC
1996
IEEE
15 years 7 months ago
Formal Techniques for an ITSEC-E4 Secure Gateway
In this paper we describe the method used to develop a gateway capable of meeting the ITSEC E4 requirements. The security policy was formally modelled and proven consistent with t...
Pierre Bieber
144
Voted
ACNS
2003
Springer
147views Cryptology» more  ACNS 2003»
15 years 8 months ago
Side-Channel Attack on Substitution Blocks
1 We describe a side-channel attack on a substitution block, which is usually implemented as a table lookup operation. In particular, we have investigated smartcard implementations...
Roman Novak
138
Voted
WETICE
2005
IEEE
15 years 9 months ago
Application of Lightweight Formal Methods to Software Security
Formal specification and verification of security has proven a challenging task. There is no single method that has proven feasible. Instead, an integrated approach which combines...
David P. Gilliam, John D. Powell, Matt Bishop