Sciweavers

2043 search results - page 107 / 409
» Reasoning About Security Models
Sort
View
110
Voted
ACIIDS
2010
IEEE
115views Database» more  ACIIDS 2010»
14 years 10 months ago
An Ambient Agent Model Incorporating an Adaptive Model for Environmental Dynamics
The environments in which ambient agents are used often may be described by dynamical models, for example in the form of a set of differential equations. In this paper an ambient a...
Jan Treur, Muhammad Umair
EUROCRYPT
2006
Springer
15 years 4 months ago
The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
We show that, in the ideal-cipher model, triple encryption (the cascade of three independently-keyed blockciphers) is more secure than single or double encryption, thereby resolvin...
Mihir Bellare, Phillip Rogaway
73
Voted
ENTCS
2007
79views more  ENTCS 2007»
15 years 19 days ago
Towards Trustworthy Spatial Messaging
Spatial messaging is a term that defines the virtual publication of data in physical places. Generally, anyone in the neighborhood of such a publication point gets the message. F...
Michel Deriaz, Jean-Marc Seigneur
92
Voted
AINA
2007
IEEE
15 years 7 months ago
Random Oracle Instantiation in Distributed Protocols Using Trusted Platform Modules
The random oracle model is an idealized theoretical model that has been successfully used for designing many cryptographic algorithms and protocols. Unfortunately, a series of res...
Vandana Gunupudi, Stephen R. Tate
OOPSLA
2007
Springer
15 years 6 months ago
The design and implementation of formal monitoring techniques
In runtime monitoring, a programmer specifies a piece of code to execute when a trace of events occurs during program execution. Previous and related work has shown that runtime m...
Eric Bodden