Sciweavers

2043 search results - page 107 / 409
» Reasoning About Security Models
Sort
View
ACIIDS
2010
IEEE
115views Database» more  ACIIDS 2010»
15 years 3 months ago
An Ambient Agent Model Incorporating an Adaptive Model for Environmental Dynamics
The environments in which ambient agents are used often may be described by dynamical models, for example in the form of a set of differential equations. In this paper an ambient a...
Jan Treur, Muhammad Umair
170
Voted
EUROCRYPT
2006
Springer
15 years 8 months ago
The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
We show that, in the ideal-cipher model, triple encryption (the cascade of three independently-keyed blockciphers) is more secure than single or double encryption, thereby resolvin...
Mihir Bellare, Phillip Rogaway
ENTCS
2007
79views more  ENTCS 2007»
15 years 5 months ago
Towards Trustworthy Spatial Messaging
Spatial messaging is a term that defines the virtual publication of data in physical places. Generally, anyone in the neighborhood of such a publication point gets the message. F...
Michel Deriaz, Jean-Marc Seigneur
AINA
2007
IEEE
15 years 11 months ago
Random Oracle Instantiation in Distributed Protocols Using Trusted Platform Modules
The random oracle model is an idealized theoretical model that has been successfully used for designing many cryptographic algorithms and protocols. Unfortunately, a series of res...
Vandana Gunupudi, Stephen R. Tate
168
Voted
OOPSLA
2007
Springer
15 years 11 months ago
The design and implementation of formal monitoring techniques
In runtime monitoring, a programmer specifies a piece of code to execute when a trace of events occurs during program execution. Previous and related work has shown that runtime m...
Eric Bodden