Sciweavers

1210 search results - page 130 / 242
» Secure Logic Synthesis
Sort
View
JCS
1998
82views more  JCS 1998»
14 years 9 months ago
On SDSI's Linked Local Name Spaces
Rivest and Lampson have recently introduced SDSI, a Simple Distributed Security Infrastructure. One of the important innovations of SDSI is the use of linked local name spaces. Th...
Martín Abadi
GIL
2009
14 years 7 months ago
The Need for Content-lists, Dictionaries and Ontologies in Expressing and Evaluating Compliance to Crop-production Regulations,
: Regulations and standards are playing an increasingly important role in crop production. Common to the vast majority of these is that they are written in a natural language which...
Edward Nash
CSFW
2004
IEEE
15 years 1 months ago
Symbolic Model Checking the Knowledge of the Dining Cryptographers
This paper describes how symbolic techniques (in particular, OBDD's) may be used to to implement an algorithm for model checking specifications in the logic of knowledge for ...
Ron van der Meyden, Kaile Su
HPCNCS
2007
14 years 11 months ago
A Formal Approach for Identity Management in Federated Web Services
The objective of the proposed work is to formally specify and implement a federated web service model in which the identity management problem and security features are analyzed. ...
S. Chandrasekaran, C. Dinesh, Kartic Ramesh, Al. M...
PROVSEC
2009
Springer
15 years 4 months ago
Breaking and Fixing of an Identity Based Multi-Signcryption Scheme
Signcryption is a cryptographic primitive that provides authentication and confidentiality simultaneously in a single logical step. It is often required that multiple senders have...
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...