Sciweavers

62 search results - page 8 / 13
» Security Protocols: Principles and Calculi
Sort
View
TPHOL
2009
IEEE
15 years 6 months ago
Formalising Observer Theory for Environment-Sensitive Bisimulation
Abstract. We consider a formalisation of a notion of observer (or intruder) theories, commonly used in symbolic analysis of security protocols. An observer theory describes the kno...
Jeremy E. Dawson, Alwen Tiu
ESORICS
2000
Springer
15 years 3 months ago
Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code
Several authors have proposed using code modification as a technique for enforcing security policies such as resource limits, access controls, and network information flows. Howeve...
Ian Welch, Robert J. Stroud
LOCWEB
2009
ACM
15 years 6 months ago
The case for a location metasystem
Microsoft has proposed an identity metasystem to standardize identity services and the principles behind them. A location metasystem can support interoperation between location se...
Nick Doty
CSFW
2006
IEEE
15 years 5 months ago
Simulation-Based Security with Inexhaustible Interactive Turing Machines
Recently, there has been much interest in extending models for simulation-based security in such a way that the runtime of protocols may depend on the length of their input. Findi...
Ralf Küsters
RIVF
2008
15 years 1 months ago
Quantum key distribution system using dual-threshold homodyne detection
In this work we present the principles of a flexible quantum key distribution (QKD) system using quadraturephase-shift-keying (QPSK) base and symbol encoding and dualthreshold bala...
Qing Xu 0006, Manuel Sabban, Philippe Gallion, Fra...