Sciweavers

5488 search results - page 68 / 1098
» On the Secure Implementation of Security Protocols
Sort
View
TOCS
2002
70views more  TOCS 2002»
14 years 11 months ago
Secure program partitioning
This paper presents secure program partitioning, a language-based technique for protecting confidential data during computation in distributed systems containing mutually untruste...
Steve Zdancewic, Lantian Zheng, Nathaniel Nystrom,...
CCS
2006
ACM
15 years 3 months ago
Modelling the relative strength of security protocols
In this paper, we present a way to think about the relative strength of security protocols using SoS, a lattice-theoretic representation of security strength. In particular, we di...
Ho Chung, Clifford Neuman
CSFW
2008
IEEE
15 years 6 months ago
Refinement Types for Secure Implementations
Jesper Bengtson, Karthikeyan Bhargavan, Céd...
ATVA
2007
Springer
134views Hardware» more  ATVA 2007»
15 years 3 months ago
Formal Modeling and Verification of High-Availability Protocol for Network Security Appliances
One of the prerequisites for information society is secure and reliable communication among computing systems. Accordingly, network security appliances become key components of inf...
Moonzoo Kim