Sciweavers

343 search results - page 48 / 69
» Formal security analysis of PKCS
Sort
View
IJNSEC
2007
121views more  IJNSEC 2007»
14 years 11 months ago
Injecting Heterogeneity Through Protocol Randomization
In this paper, we argue that heterogeneity should be an important principle in design and use of cryptographic protocols. We use automated formal analysis tools to randomly genera...
Li Zhuang, J. D. Tygar, Rachna Dhamija
FC
2005
Springer
110views Cryptology» more  FC 2005»
15 years 5 months ago
Approximate Message Authentication and Biometric Entity Authentication
Approximate Message Authentication Code (AMAC) is a recently introduced cryptographic primitive with several applications in the areas of cryptography and coding theory. Briefly s...
Giovanni Di Crescenzo, R. F. Graveman, Renwei Ge, ...
IEEEARES
2008
IEEE
15 years 6 months ago
Risk as Dependability Metrics for the Evaluation of Business Solutions: A Model-driven Approach
The analysis of business solutions is one of critical issues in industry. Risk is one of the most preeminent and accepted metrics for the evaluation of business solutions. Not sur...
Yudistira Asnar, Rocco Moretti, Maurizio Sebastian...
SAFECOMP
1998
Springer
15 years 3 months ago
Safety Verification of Software Using Structured Petri Nets
A method is described for the analysis and the verification of safety in software systems. The method offers a formal notation for describing the software structure, the means for ...
Krzysztof Sacha
CHES
2006
Springer
146views Cryptology» more  CHES 2006»
15 years 3 months ago
Path Swapping Method to Improve DPA Resistance of Quasi Delay Insensitive Asynchronous Circuits
This paper presents a Path Swapping (PS) method which enables to enhance the security of Quasi Delay Insensitive Asynchronous Circuits against Power Analysis (PA) attack. This appr...
G. Fraidy Bouesse, Gilles Sicard, Marc Renaudin