Sciweavers

1183 search results - page 24 / 237
» On flow-sensitive security types
Sort
View
COMPSEC
2010
142views more  COMPSEC 2010»
15 years 1 months ago
Provably correct Java implementations of Spi Calculus security protocols specifications
Spi Calculus is an untyped high level modeling language for security protocols, used for formal protocols specification and verification. In this paper, a type system for the Spi ...
Alfredo Pironti, Riccardo Sisto
IJACT
2010
90views more  IJACT 2010»
14 years 11 months ago
Unconditionally reliable and secure message transmission in undirected synchronous networks: possibility, feasibility and optima
: We study the interplay of network connectivity and the issues related to the `possibility', `feasibility' and `optimality' for unconditionally reliable message tra...
Arpita Patra, Ashish Choudhury, C. Pandu Rangan, K...
IJNSEC
2010
146views more  IJNSEC 2010»
14 years 11 months ago
A Novel Digital Envelope Approach for A Secure E-Commerce Channel
Data privacy and integrity will be the crucial and significant factors in recent times for trade which will be transacted over the Internet through e-commerce and mcommerce channe...
Ramachandran Ganesan, Mohan Gobi, Kanniappan Vivek...
IJNSEC
2010
143views more  IJNSEC 2010»
14 years 11 months ago
A New Secure Remote User Authentication Scheme with Smart Cards
Remote user authentication scheme is one of the simplest and the most convenient authentication mechanisms to deal with secret data over insecure networks. These types of schemes ...
Manoj Kumar
HICSS
2012
IEEE
260views Biometrics» more  HICSS 2012»
14 years 1 days ago
Effort Estimates for Vulnerability Discovery Projects
Security vulnerabilities continue to be an issue in the software field and new severe vulnerabilities are discovered in software products each month. This paper analyzes estimates...
Teodor Sommestad, Hannes Holm, Mathias Ekstedt