Sciweavers

5722 search results - page 193 / 1145
» Security Function Interactions
Sort
View
STOC
2002
ACM
152views Algorithms» more  STOC 2002»
16 years 1 months ago
Universally composable two-party and multi-party secure computation
d Abstract) Ran Canetti Yehuda Lindell Rafail Ostrovsky Amit Sahai? We show how to securely realize any multi-party functionality in a universally composable way, regardless of th...
Ran Canetti, Yehuda Lindell, Rafail Ostrovsky, Ami...
123
Voted
TRUSTBUS
2005
Springer
15 years 6 months ago
Securing Operating System Services Based on Smart Cards
The executions of operating system services based on smart cards allow one to personalize some functionalities of the operating system by using the secret information stored in a s...
Luigi Catuogno, Roberto Gassirà, Michele Ma...
APSEC
2009
IEEE
14 years 10 months ago
A Formal Framework to Integrate Timed Security Rules within a TEFSM-Based System Specification
Abstract--Formal methods are very useful in software industry and are becoming of paramount importance in practical engineering techniques. They involve the design and the modeling...
Wissam Mallouli, Amel Mammar, Ana R. Cavalli
150
Voted
HOST
2011
IEEE
14 years 12 days ago
Enhancing security via provably trustworthy hardware intellectual property
—We introduce a novel hardware intellectual property acquisition protocol, show how it can support the transfer of provably trustworthy modules between hardware IP producers and ...
Eric Love, Yier Jin, Yiorgos Makris
105
Voted
CSCWD
2007
Springer
15 years 7 months ago
An interactive graph visualization for handling cooperative design activity context
The context of a collective activity is characterized by all information produced during the activity. The comprehension of this context by each actor is essential for the success...
Gilles Halin