Sciweavers

2043 search results - page 137 / 409
» Reasoning About Security Models
Sort
View
106
Voted
IMA
2005
Springer
126views Cryptology» more  IMA 2005»
15 years 6 months ago
Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme
Abstract. Identity-based encryption (IBE) is a special asymmetric encryption method where a public encryption key can be an arbitrary identifier and the corresponding private decr...
Liqun Chen, Zhaohui Cheng
112
Voted
CCS
2008
ACM
15 years 2 months ago
Verifiable functional purity in java
Proving that particular methods within a code base are functionally pure--deterministic and side-effect free--would aid verification of security properties including function inve...
Matthew Finifter, Adrian Mettler, Naveen Sastry, D...
115
Voted
DMKD
2003
ACM
151views Data Mining» more  DMKD 2003»
15 years 6 months ago
Assuring privacy when big brother is watching
Homeland security measures are increasing the amount of data collected, processed and mined. At the same time, owners of the data raised legitimate concern about their privacy and...
Murat Kantarcioglu, Chris Clifton
ACISP
2009
Springer
15 years 7 months ago
Building Key-Private Public-Key Encryption Schemes
In the setting of identity-based encryption with multiple trusted authorities, TA anonymity formally models the inability of an adversary to distinguish two ciphertexts correspondi...
Kenneth G. Paterson, Sriramkrishnan Srinivasan
92
Voted
HICSS
2003
IEEE
179views Biometrics» more  HICSS 2003»
15 years 6 months ago
JUMBL: A Tool for Model-Based Statistical Testing
Statistical testing of software based on a usage model is a cost-effective and efficient means to make inferences about software quality. In order to apply this method, a usage m...
Stacy J. Prowell