Sciweavers

3811 search results - page 21 / 763
» The Safe-Tcl Security Model
Sort
View
ACISP
2005
Springer
15 years 5 months ago
Dynamic Group Key Agreement in Tree-Based Setting
We present a provably secure tree based authenticated group key agreement protocol in dynamic scenario. Bilinear pairing and multi-signature are at the heart of our protocol. We p...
Ratna Dutta, Rana Barua
TCC
2009
Springer
131views Cryptology» more  TCC 2009»
16 years 11 days ago
Secure Computability of Functions in the IT Setting with Dishonest Majority and Applications to Long-Term Security
It is well known that general secure function evaluation (SFE) with information-theoretical (IT) security is infeasible in presence of a corrupted majority in the standard model. ...
Robin Künzler, Jörn Müller-Quade, D...
ECBS
2007
IEEE
155views Hardware» more  ECBS 2007»
15 years 6 months ago
Integrating Security Modeling into Embedded System Design
There is an ever increasing concern about security threats as embedded systems are moving towards networked applications. Model based approaches have proven to be effective techni...
Matthew Eby, Jan Werner, Gabor Karsai, Ákos...
RE
2005
Springer
15 years 5 months ago
ST-Tool: A CASE Tool for Security Requirements Engineering
Security Requirements Engineering is emerging as a branch of Software Engineering, spurred by the realization that security must be dealt with early on during the requirements pha...
Paolo Giorgini, Fabio Massacci, John Mylopoulos, N...
COMPSAC
2010
IEEE
14 years 9 months ago
Challenges and Future Directions of Software Technology: Secure Software Development
Developing large scale software systems has major security challenges. This paper describes the issues involved and then addresses two topics: formal methods for emerging secure sy...
Bhavani M. Thuraisingham, Kevin W. Hamlen