Sciweavers

286 search results - page 38 / 58
» Pitfalls in Formal Reasoning about Security Protocols
Sort
View
121
Voted
HOST
2011
IEEE
13 years 9 months ago
Enhancing security via provably trustworthy hardware intellectual property
—We introduce a novel hardware intellectual property acquisition protocol, show how it can support the transfer of provably trustworthy modules between hardware IP producers and ...
Eric Love, Yier Jin, Yiorgos Makris
121
Voted
IMA
2005
Springer
162views Cryptology» more  IMA 2005»
15 years 3 months ago
Pairing-Based Cryptography at High Security Levels
In recent years cryptographic protocols based on the Weil and Tate pairings on elliptic curves have attracted much attention. A notable success in this area was the elegant solutio...
Neal Koblitz, Alfred Menezes
75
Voted
IFIP
2009
Springer
15 years 4 months ago
Analysing the Information Flow Properties of Object-Capability Patterns
We consider the problem of detecting covert channels within security-enforcing object-capability patterns. Traditional formalisms for reasoning about the security properties of obj...
Toby C. Murray, Gavin Lowe
OOPSLA
2004
Springer
15 years 2 months ago
Efficient data race and deadlock prevention in concurrent object-oriented programs
The main goal of this PhD thesis is to propose and implement a methodology for the construction of programs based on the SCOOP model, and for modular reasoning about their correct...
Piotr Nienaltowski
PKC
2010
Springer
187views Cryptology» more  PKC 2010»
14 years 11 months ago
Confidential Signatures and Deterministic Signcryption
Encrypt-and-sign, where one encrypts and signs a message in parallel, is usually not recommended for confidential message transmission. The reason is that the signature typically l...
Alexander W. Dent, Marc Fischlin, Mark Manulis, Ma...