Sciweavers

2043 search results - page 144 / 409
» Reasoning About Security Models
Sort
View
CRYPTO
2008
Springer
150views Cryptology» more  CRYPTO 2008»
15 years 2 months ago
On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles
Abstract. The study of deterministic public-key encryption was initiated by Bellare et al. (CRYPTO '07), who provided the "strongest possible" notion of security for...
Alexandra Boldyreva, Serge Fehr, Adam O'Neill
103
Voted
PET
2009
Springer
15 years 7 months ago
Using Linkability Information to Attack Mix-Based Anonymity Services
There exist well established models for anonymity focusing on traffic analysis, i. e., analysing properties of single messages as, e. g., timing. However there is only little work ...
Stefan Schiffner, Sebastian Clauß
CAV
2005
Springer
173views Hardware» more  CAV 2005»
15 years 6 months ago
Building Your Own Software Model Checker Using the Bogor Extensible Model Checking Framework
Model checking has proven to be an effective technology for verification and debugging in hardware and more recently in software domains. We believe that recent trends in both th...
Matthew B. Dwyer, John Hatcliff, Matthew Hoosier, ...
86
Voted
EHCI
2001
15 years 2 months ago
Detecting Multiple Classes of User Errors
Abstract. Systematic user errors commonly occur in the use of interactive systems. We describe a formal reusable user model implemented in higher-order logic that can be used for m...
Paul Curzon, Ann Blandford
117
Voted
ICINCO
2004
122views Robotics» more  ICINCO 2004»
15 years 2 months ago
Data Security Considerations in Modern Automation Networks
: The automation manufacturing business has reached its turning point and manufacturers are forced to create new business areas. Their expertise about field devices will be the sou...
Mikko Salmenperä, Jari Seppälä