Sciweavers

1757 search results - page 143 / 352
» Secure Content Validation
Sort
View
CSFW
2007
IEEE
15 years 6 months ago
Computationally Sound Mechanized Proofs of Correspondence Assertions
We present a new mechanized prover for showing correspondence assertions for cryptographic protocols in the computational model. Correspondence assertions are useful in particular...
Bruno Blanchet
CISC
2007
Springer
111views Cryptology» more  CISC 2007»
15 years 6 months ago
Multivariates Polynomials for Hashing
We propose the idea of building a secure hash using quadratic or higher degree multivariate polynomials over a finite field as the compression function. We analyze some security ...
Jintai Ding, Bo-Yin Yang
ACSAC
2005
IEEE
15 years 5 months ago
Dynamic Taint Propagation for Java
Improperly validated user input is the underlying root cause for a wide variety of attacks on web-based applications. Static approaches for detecting this problem help at the time...
Vivek Haldar, Deepak Chandra, Michael Franz
CNSR
2005
IEEE
15 years 5 months ago
Managing Access Control for Presence-Based Services
This paper presents an approach for managing access to services over presence-based communications based on the context of the situation. This paper addresses two technical challe...
Anand Dersingh, Ramiro Liscano, Allan G. Jost
CSFW
2005
IEEE
15 years 5 months ago
Reconstruction of Attacks against Cryptographic Protocols
We study an automatic technique for the verification of cryptographic protocols based on a Horn clause model of the protocol. This technique yields proofs valid for an unbounded ...
Xavier Allamigeon, Bruno Blanchet