Sciweavers

1183 search results - page 112 / 237
» On flow-sensitive security types
Sort
View
CCS
1993
ACM
15 years 8 months ago
NetCash: A Design for Practical Electronic Currency on the Internet
NetCash is a framework that supports realtime electronic payments with provision of anonymity over an unsecure network. It is designed to enable new types of services on the Inter...
Gennady Medvinsky, B. Clifford Neuman
153
Voted
ASIAN
2006
Springer
153views Algorithms» more  ASIAN 2006»
15 years 8 months ago
Automata-Based Confidentiality Monitoring
Abstract Non-interference is typically used as a baseline security policy to formalize confidentiality of secret information manipulated by a program. In contrast to static checkin...
Gurvan Le Guernic, Anindya Banerjee, Thomas P. Jen...
ETRICS
2006
15 years 8 months ago
A Comparison of Market Approaches to Software Vulnerability Disclosure
Abstract. Practical computer (in)security is largely driven by the existence of and knowledge about vulnerabilities, which can be exploited to breach security mechanisms. Although ...
Rainer Böhme
FSE
2006
Springer
111views Cryptology» more  FSE 2006»
15 years 8 months ago
Analysis of Step-Reduced SHA-256
This is the first article analyzing the security of SHA-256 against fast collision search which considers the recent attacks by Wang et al. We show the limits of applying technique...
Florian Mendel, Norbert Pramstaller, Christian Rec...
CSFW
2008
IEEE
15 years 6 months ago
End-to-End Enforcement of Erasure and Declassification
Declassification occurs when the confidentiality of information is weakened; erasure occurs when the confidentiality of information is strengthened, perhaps to the point of comple...
Stephen Chong, Andrew C. Myers