Sciweavers

5488 search results - page 101 / 1098
» On the Secure Implementation of Security Protocols
Sort
View
HICSS
2009
IEEE
138views Biometrics» more  HICSS 2009»
15 years 3 months ago
E-Voting System Security Optimization
Security of e-voting systems does not only depend on the voting protocol 1 or the software used but concerns the whole system with all its components. To guarantee security a holi...
Barbara Ondrisek
PET
2009
Springer
15 years 6 months ago
Privacy-Preserving Face Recognition
Abstract. Face recognition is increasingly deployed as a means to unobtrusively verify the identity of people. The widespread use of biometrics raises important privacy concerns, i...
Zekeriya Erkin, Martin Franz, Jorge Guajardo, Stef...
CSFW
2002
IEEE
15 years 4 months ago
Polynomial Fairness and Liveness
Important properties of many protocols are liveness or availability, i.e., that something good happens now and then. In asynchronous scenarios these properties obviously depend on...
Michael Backes, Birgit Pfitzmann, Michael Steiner,...
CADE
2005
Springer
16 years 5 days ago
Deduction with XOR Constraints in Security API Modelling
We introduce XOR constraints, and show how they enable a theorem prover to reason effectively about security critical subsystems which employ bitwise XOR. Our primary case study is...
Graham Steel
ACISP
2008
Springer
15 years 6 months ago
Comparing the Pre- and Post-specified Peer Models for Key Agreement
In the pre-specified peer model for key agreement, it is assumed that a party knows the identifier of its intended communicating peer when it commences a protocol run. On the oth...
Alfred Menezes, Berkant Ustaoglu