Sciweavers

3504 search results - page 430 / 701
» Secure protocol composition
Sort
View
DCC
2005
IEEE
16 years 2 months ago
Signcryption with Non-interactive Non-repudiation
Signcryption [35] is a public key primitive that achieves the functionality of both an encryption scheme and a signature scheme simultaneously. It does this more efficiently than a...
John Malone-Lee
ACSD
2008
IEEE
108views Hardware» more  ACSD 2008»
15 years 9 months ago
PicNIc - Pi-calculus non-interference checker
PICNIC is a tool for verifying security properties of systems, namely non-interference properties of processes expressed as terms of the π-calculus with two security levels and d...
Silvia Crafa, Matteo Mio, Marino Miculan, Carla Pi...
114
Voted
CSFW
2005
IEEE
15 years 8 months ago
Belief in Information Flow
To reason about information flow based on beliefs, a new model is developed that describes how attacker beliefs change due to the attacker’s observation of the execution of a p...
Michael R. Clarkson, Andrew C. Myers, Fred B. Schn...
119
Voted
OOPSLA
2010
Springer
15 years 27 days ago
Component adaptation and assembly using interface relations
Software’s expense owes partly to frequent reimplementation of similar functionality and partly to maintenance of patches, ports or components targeting evolving interfaces. Mor...
Stephen Kell
95
Voted
ESORICS
2002
Springer
16 years 2 months ago
Outbound Authentication for Programmable Secure Coprocessors
A programmable secure coprocessor platform can help solve many security problems in distributed computing. However, these solutions usually require that coprocessor applications be...
Sean W. Smith