Sciweavers

2043 search results - page 114 / 409
» Reasoning About Security Models
Sort
View
103
Voted
JLP
2011
160views more  JLP 2011»
14 years 7 months ago
Axiomatizability of representable domain algebras
The family of domain algebras provide an elegant formal system for automated reasoning about programme verification. Their primary models are algebras of relations, viz. represen...
Robin Hirsch, Szabolcs Mikulás
IFM
1999
Springer
15 years 5 months ago
Modelling Discrete Behaviour in a Continuous-Time Formalism
Embedded real-time systems consist of a digital controller interacting with its physical environment. Developing such systems therefore involves specifying and reasoning about bot...
Colin J. Fidge
100
Voted
EUROCRYPT
2010
Springer
15 years 5 months ago
Plaintext-Dependent Decryption: A Formal Security Treatment of SSH-CTR
This paper presents a formal security analysis of SSH in counter mode in a security model that accurately captures the capabilities of real-world attackers, as well as security-rel...
Kenneth G. Paterson, Gaven J. Watson
99
Voted
ASIACRYPT
2001
Springer
15 years 5 months ago
Provable Security of KASUMI and 3GPP Encryption Mode f8
Within the security architecture of the 3GPP system there is a standardised encryption mode f8 based on the block cipher KASUMI. In this work we examine the pseudorandomness of the...
Ju-Sung Kang, Sang Uk Shin, Dowon Hong, Okyeon Yi
101
Voted
AINA
2005
IEEE
15 years 2 months ago
Estimations on the Security Aspect of Brand's Electronic Cash Scheme
In Crypto’93, Stefan Brands [1] proposed a very efficient off-line electronic cash. Then, the subsequent researchers such as Ernest Foo [2,3], WK Yip [4] and Yiannis [5] develop...
Chang Yu Cheng, Jasmy Yunus, Kamaruzzaman Seman