Sciweavers

64 search results - page 2 / 13
» TASTY: tool for automating secure two-party computations
Sort
View
COMPUTER
2008
114views more  COMPUTER 2008»
13 years 6 months ago
Automated Code Review Tools for Security
Gary McGraw
IJNSEC
2007
121views more  IJNSEC 2007»
13 years 6 months ago
Injecting Heterogeneity Through Protocol Randomization
In this paper, we argue that heterogeneity should be an important principle in design and use of cryptographic protocols. We use automated formal analysis tools to randomly genera...
Li Zhuang, J. D. Tygar, Rachna Dhamija
GIS
2006
ACM
13 years 6 months ago
Reactions to geovisualization: an experience from a European project
The paper is written jointly by two parties, computer scientists specializing in geovisualization and experts in forestry, who cooperated within a joint project. The authors tell ...
Gennady L. Andrienko, Natalia V. Andrienko, Richar...
CRYPTO
2011
Springer
222views Cryptology» more  CRYPTO 2011»
12 years 6 months ago
Computer-Aided Security Proofs for the Working Cryptographer
Abstract. We present EasyCrypt, an automated tool for elaborating security proofs of cryptographic systems from proof sketches—compact, formal representations of the essence of a...
Gilles Barthe, Benjamin Grégoire, Sylvain H...
KBSE
2007
IEEE
14 years 17 days ago
Tools for model-based security engineering: models vs. code
We present tools to support model-based security engineering on both the model and the code level. In the approach supported by these tools, one firstly specifies the securitycr...
Jan Jürjens, Yijun Yu