Sciweavers

2043 search results - page 159 / 409
» Reasoning About Security Models
Sort
View
KBSE
2008
IEEE
15 years 11 months ago
MTSA: The Modal Transition System Analyser
Modal Transition Systems (MTS) are operational models that distinguish between required and proscribed behaviour of the system to be and behaviour which it is not yet known whethe...
Nicolás D'Ippolito, Dario Fischbein, Marsha...
123
Voted
CCS
2007
ACM
15 years 11 months ago
A calculus of challenges and responses
er presents a novel approach for concisely abstracting authentication s and for subsequently analyzing those abstractions in a sound manner, i.e., deriving authentication guarante...
Michael Backes, Agostino Cortesi, Riccardo Focardi...
CCS
2005
ACM
15 years 11 months ago
On fairness in simulatability-based cryptographic systems
Simulatability constitutes the cryptographic notion of a secure refinement and has asserted its position as one of the fundamental concepts of modern cryptography. Although simula...
Michael Backes, Dennis Hofheinz, Jörn Mü...
CSFW
2010
IEEE
15 years 9 months ago
Approximation and Randomization for Quantitative Information-Flow Analysis
—Quantitative information-flow analysis (QIF) is an emerging technique for establishing information-theoretic confidentiality properties. Automation of QIF is an important step...
Boris Köpf, Andrey Rybalchenko
153
Voted
ISI
2008
Springer
15 years 5 months ago
Identity management architecture
Identity Management plays a crucial role in many application contexts, including e-governments, e-commerce, business intelligence, investigation, and homeland security. The variet...
Uwe Glässer, Mona Vajihollahi