Sciweavers

2303 search results - page 2 / 461
» The Cryptographic Abstract Machine
Sort
View
DBSEC
2007
128views Database» more  DBSEC 2007»
13 years 7 months ago
gVault: A Gmail Based Cryptographic Network File System
Abstract. In this paper, we present the design of gVault, a cryptographic network file system that utilizes the data storage provided by Gmail’s web-based email service. Such a ...
Ravi Chandra Jammalamadaka, Roberto Gamboni, Shara...
FSEN
2007
Springer
14 years 13 days ago
Hoare Logic for ARM Machine Code
This paper shows how a machine-code Hoare logic is used to lift reasoning from the tedious operational model of a machine lana manageable level of abstraction without making simpli...
Magnus O. Myreen, Anthony C. J. Fox, Michael J. C....
MAS
1998
Springer
152views Communications» more  MAS 1998»
13 years 10 months ago
D'Agents: Security in a Multiple-Language, Mobile-Agent System
Abstract. Mobile-agent systems must address three security issues: protecting an individual machine, protecting a group of machines, and protecting an agent. In this chapter, we di...
Robert S. Gray, David Kotz, George Cybenko, Daniel...
SAS
1999
Springer
117views Formal Methods» more  SAS 1999»
13 years 10 months ago
Abstracting Cryptographic Protocols with Tree Automata
ing Cryptographic Protocols with Tree Automata David Monniaux http://www.di.ens.fr/%7Fmonniaux, Laboratoire d’Informatique, ´Ecole Normale Sup´erieure, 45 rue d’Ulm , 75230 P...
David Monniaux
CSFW
2008
IEEE
14 years 23 days ago
Cryptographically-Sound Protocol-Model Abstractions
Christoph Sprenger, David A. Basin