This paper defends an augmented cognitively oriented "generic-design hypothesis": There are both significant similarities between the design activities implemented in sit...
We present a programming model for building web applications with security properties that can be confidently verified during a security review. In our model, applications are d...
Akshay Krishnamurthy, Adrian Mettler, David Wagner
In the challenge of ensuring the correct behaviour of legacy implementations of security protocols, a formally-based approach is presented to design and implement monitors that sto...
Case study describing tools and processes enabling accelerated adoption of Usability Standards, and increased efficiencies in development of accessible, internationalized, branded...
Abstract. Public-key encryption schemes rely for their IND-CPA security on per-message fresh randomness. In practice, randomness may be of poor quality for a variety of reasons, le...
Mihir Bellare, Zvika Brakerski, Moni Naor, Thomas ...