Sciweavers

4820 search results - page 181 / 964
» Implementing Signatures for C
Sort
View
CCS
2010
ACM
15 years 10 months ago
Cryptographic role-based security mechanisms based on role-key hierarchy
Even though role-based access control (RBAC) can tremendously help us minimize the complexity in administering users, it is still needed to realize the notion of roles at the reso...
Yan Zhu, Gail-Joon Ahn, Hongxin Hu, Huaixi Wang
CSFW
2009
IEEE
15 years 10 months ago
Universally Composable Symmetric Encryption
For most basic cryptographic tasks, such as public key encryption, digital signatures, authentication, key exchange, and many other more sophisticated tasks, ideal functionalities...
Ralf Küsters, Max Tuengerthal
ACISICIS
2007
IEEE
15 years 9 months ago
An Efficient and Robust Technique for Region Based Shape Representation and Retrieval
Most region based shape image retrieval techniques in literature are complex to implement. As the result of their complex computations, the retrieval performance of these techniqu...
Dengsheng Zhang, Melissa Chen Yi Lim
CSFW
2007
IEEE
15 years 9 months ago
Computationally Sound Mechanized Proofs of Correspondence Assertions
We present a new mechanized prover for showing correspondence assertions for cryptographic protocols in the computational model. Correspondence assertions are useful in particular...
Bruno Blanchet
SP
2006
IEEE
147views Security Privacy» more  SP 2006»
15 years 9 months ago
A Computationally Sound Mechanized Prover for Security Protocols
We present a new mechanized prover for secrecy properties of security protocols. In contrast to most previous provers, our tool does not rely on the Dolev-Yao model, but on the co...
Bruno Blanchet