Sciweavers

2043 search results - page 44 / 409
» Reasoning About Security Models
Sort
View
UTP
2010
15 years 2 months ago
Unifying Theories of Confidentiality
Abstract. This paper presents a framework for reasoning about the security of confidential data within software systems. A novelty is that we use Hoare and He's Unifying Theor...
Michael J. Banks, Jeremy L. Jacob
ESAW
2007
Springer
15 years 10 months ago
Arguing about Reputation: The LRep Language
In the field of multiagent systems (MAS), the computational models of trust and reputation have attracted increasing interest since electronic and open environments became a reali...
Isaac Pinyol, Jordi Sabater-Mir
CRYPTO
2011
Springer
207views Cryptology» more  CRYPTO 2011»
14 years 4 months ago
Secure Computation on the Web: Computing without Simultaneous Interaction
Secure computation enables mutually suspicious parties to compute a joint function of their private inputs while providing strong security guarantees. Amongst other things, even i...
Shai Halevi, Yehuda Lindell, Benny Pinkas
PET
2009
Springer
15 years 11 months ago
APOD: Anonymous Physical Object Delivery
Delivery of products bought online can violate consumers’ privacy, although not in a straightforward way. In particular, delivery companies that have contracted with a website kn...
Elli Androulaki, Steven M. Bellovin
PKC
2010
Springer
187views Cryptology» more  PKC 2010»
15 years 6 months ago
Confidential Signatures and Deterministic Signcryption
Encrypt-and-sign, where one encrypts and signs a message in parallel, is usually not recommended for confidential message transmission. The reason is that the signature typically l...
Alexander W. Dent, Marc Fischlin, Mark Manulis, Ma...