Sciweavers

343 search results - page 25 / 69
» Formal security analysis of PKCS
Sort
View
JCS
2010
80views more  JCS 2010»
14 years 6 months ago
Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols
We introduce constraint differentiation, a powerful technique for reducing search when model-checking security protocols using constraint-based methods. Constraint differentiation...
Sebastian Mödersheim, Luca Viganò, Dav...
FROCOS
2007
Springer
15 years 6 months ago
Towards an Automatic Analysis of Web Service Security
Web services send and receive messages in XML syntax with some parts hashed, encrypted or signed, according to the WS-Security standard. In this paper we introduce a model to forma...
Yannick Chevalier, Denis Lugiez, Michaël Rusi...
ASIACRYPT
2006
Springer
15 years 3 months ago
Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding
Understanding what construction strategy has a chance to be a good hash function is extremely important nowadays. In TCC'04, Maurer et al. [13] introduced the notion of indiff...
Donghoon Chang, Sangjin Lee, Mridul Nandi, Moti Yu...
TDSC
2008
152views more  TDSC 2008»
14 years 11 months ago
Towards Formal Verification of Role-Based Access Control Policies
Specifying and managing access control policies is a challenging problem. We propose to develop formal verification techniques for access control policies to improve the current s...
Somesh Jha, Ninghui Li, Mahesh V. Tripunitara, Qih...
ADBIS
2004
Springer
94views Database» more  ADBIS 2004»
15 years 3 months ago
Formalization and Detection of Events over a Sliding Window in Active Databases Using Interval-Based Semantics
Trend analysis and forecasting applications (e.g., securities trading, stock market, and after-the-fact diagnosis) need event detection along a moving time window. Event-driven app...
Raman Adaikkalavan, Sharma Chakravarthy