Sciweavers

3811 search results - page 82 / 763
» The Safe-Tcl Security Model
Sort
View
CSFW
2006
IEEE
15 years 6 months ago
Simulation-Based Security with Inexhaustible Interactive Turing Machines
Recently, there has been much interest in extending models for simulation-based security in such a way that the runtime of protocols may depend on the length of their input. Findi...
Ralf Küsters
CSFW
1996
IEEE
15 years 4 months ago
Towards a model of storage jamming
John P. McDermott, David M. Goldschlag
AINA
2004
IEEE
15 years 3 months ago
Formal Verification of PAP and EAP-MD5 Protocols in Wireless Networks: FDR Model Checking
IEEE 802.1x and authentication server based security protocols are mainly used for enhancing security of wireless networks. In this paper, we specify PAP and EAP-MD5 based securit...
Il-Gon Kim, Jin-Young Choi
ETRICS
2006
15 years 3 months ago
Controlling Access to Documents: A Formal Access Control Model
Paul E. Sevinç, David A. Basin, Ernst-R&uum...
OOPSLA
2000
Springer
15 years 3 months ago
Improving the Java memory model using CRF
Jan-Willem Maessen, Arvind, Xiaowei Shen