Sciweavers

1597 search results - page 40 / 320
» Mental Models of Computer Security
Sort
View
EUROCRYPT
2003
Springer
15 years 7 months ago
On the Limitations of Universally Composable Two-Party Computation without Set-up Assumptions
The recently proposed universally composable (UC) security framework for analyzing security of cryptographic protocols provides very strong security guarantees. In particular, a p...
Ran Canetti, Eyal Kushilevitz, Yehuda Lindell
SIGCSE
2009
ACM
143views Education» more  SIGCSE 2009»
15 years 8 months ago
Thinking about computational thinking
Jeannette Wing’s call for teaching Computational Thinking (CT) as a formative skill on par with reading, writing, and arithmetic places computer science in the category of basic...
James J. Lu, George H. L. Fletcher
109
Voted
EUROPAR
2008
Springer
15 years 3 months ago
Towards a Security Model to Bridge Internet Desktop Grids and Service Grids
Gabriel Caillat, Oleg Lodygensky, Etienne Urbah, G...
WS
2006
ACM
15 years 7 months ago
Modeling Ad-hoc rushing attack in a negligibility-based security framework
In this paper, we propose a formal notion of network security for ad hoc networks. We adopt a probabilistic security framework, that is, security is defined by a polynomially bou...
Jiejun Kong, Xiaoyan Hong, Mario Gerla
TGC
2007
Springer
15 years 8 months ago
Computational Soundness of Equational Theories (Tutorial)
Abstract. We study the link between formal and cryptographic models for security protocols in the presence of passive and adaptive adversaries. We first describe the seminal resul...
Steve Kremer