Sciweavers

1302 search results - page 18 / 261
» Soundness in the Public-Key Model
Sort
View
MMM
2005
Springer
144views Multimedia» more  MMM 2005»
15 years 7 months ago
Generative Sound Models
An overview of generative sound models is presented. We discuss the benefits they offer in a variety of media contexts including indexing and retrieval, compression, sonification,...
Lonce L. Wyse
ESORICS
2007
Springer
15 years 8 months ago
On the Privacy of Concealed Data Aggregation
A formal treatment to the privacy of concealed data aggregation (CDA) is given. While there exist a handful of constructions, rigorous security models and analyses for CDA are stil...
Aldar C.-F. Chan, Claude Castelluccia
PKC
2007
Springer
111views Cryptology» more  PKC 2007»
15 years 8 months ago
Optimistic Fair Exchange in a Multi-user Setting
: This paper addresses the security of optimistic fair exchange in a multi-user setting. While the security of public key encryption and public key signature schemes in a single-us...
Yevgeniy Dodis, Pil Joong Lee, Dae Hyun Yum
ACSAC
1999
IEEE
15 years 6 months ago
Generic Support for PKIX Certificate Management in CDSA
The Common Data Security Architecture (CDSA) from the Open Group is a flexible standard that defines APIs for security services needed for implementing Public Key Infrastructure (...
Shabnam Erfani, C. Sekar Chandersekaran
MOVEP
2000
167views Hardware» more  MOVEP 2000»
15 years 5 months ago
Model Checking: A Tutorial Overview
We survey principles of model checking techniques for the automatic analysis of reactive systems. The use of model checking is exemplified by an analysis of the Needham-Schroeder p...
Stephan Merz