Sciweavers

1183 search results - page 42 / 237
» On flow-sensitive security types
Sort
View
ECOOP
2000
Springer
15 years 8 months ago
Runtime Support for Type-Safe Dynamic Java Classes
Modern software must evolve in response to changing conditions. In the most widely used programming environments, code is static and cannot change at runtime. This poses problems ...
Scott Malabarba, Raju Pandey, Jeff Gragg, Earl T. ...
IEEEIAS
2008
IEEE
15 years 11 months ago
A Model for the Study of Privacy Issues in Secure Shell Connections
: The Secure Shell (SSH) protocol strives to protect the privacy of its users in several ways. On one hand, the strong encryption and authentication algorithms that it adopts provi...
Maurizio Dusi, Francesco Gringoli, Luca Salgarelli
POPL
2007
ACM
16 years 4 months ago
Types, bytes, and separation logic
We present a formal model of memory that both captures the lowlevel features of C's pointers and memory, and that forms the basis for an expressive implementation of separati...
Harvey Tuch, Gerwin Klein, Michael Norrish
CRYPTO
2007
Springer
145views Cryptology» more  CRYPTO 2007»
15 years 10 months ago
Chernoff-Type Direct Product Theorems
Consider a challenge-response protocol where the probability of a correct response is at least α for a legitimate user and at most β < α for an attacker. One example is a CAP...
Russell Impagliazzo, Ragesh Jaiswal, Valentine Kab...
ACNS
2010
Springer
154views Cryptology» more  ACNS 2010»
15 years 9 months ago
Shrinking the Keys of Discrete-Log-Type Lossy Trapdoor Functions
To this day, realizations in the standard-model of (lossy) trapdoor functions from discrete-log-type assumptions require large public key sizes, e.g., about Θ(λ2 ) group elements...
Xavier Boyen, Brent Waters