Sciweavers

4111 search results - page 148 / 823
» Security, Protocols, and Trust
Sort
View
109
Voted
USS
2008
15 years 3 months ago
Verifying Compliance of Trusted Programs
In this paper, we present an approach for verifying that trusted programs correctly enforce system security goals when deployed. A trusted program is trusted to only perform safe ...
Sandra Rueda, Dave King 0002, Trent Jaeger
97
Voted
TCC
2007
Springer
124views Cryptology» more  TCC 2007»
15 years 7 months ago
Tackling Adaptive Corruptions in Multicast Encryption Protocols
We prove a computational soundness theorem for symmetric-key encryption protocols that can be used to analyze security against adaptively corrupting adversaries (that is, adversar...
Saurabh Panjwani
107
Voted
WECWIS
1999
IEEE
116views ECommerce» more  WECWIS 1999»
15 years 5 months ago
Towards a Scalable PKI for Electronic Commerce Systems
In an e-commerce system, security, in particular authentication, is of paramount importance. Public-key Infrastructure is often used to enforce authentication and the property of ...
Chenxi Wang, William A. Wulf
104
Voted
IJISEC
2008
101views more  IJISEC 2008»
15 years 25 days ago
SAT-based model-checking for security protocols analysis
We present a model checking technique for security protocols based on a reduction to propositional logic. At the core of our approach is a procedure that, given a description of th...
Alessandro Armando, Luca Compagna
IJNSEC
2007
115views more  IJNSEC 2007»
15 years 22 days ago
Novel Secure Communication Protocol for Conditional Access System
A protocol for secure communication between set-top box and smart card in conditional access system is proposed. The proposed protocol uses the Schnorr identification scheme to a...
Yongliang Liu, Xiaolin Yang, Hongxun Yao, Wen Gao