Sciweavers

180 search results - page 27 / 36
» Verifying Security Properties of Cryptoprotocols: A Novel Ap...
Sort
View
79
Voted
CAV
2009
Springer
206views Hardware» more  CAV 2009»
16 years 6 days ago
D-Finder: A Tool for Compositional Deadlock Detection and Verification
D-Finder tool implements a compositional method for the verification of component-based systems described in BIP language encompassing multi-party interaction. For deadlock detecti...
Saddek Bensalem, Marius Bozga, Thanh-Hung Nguyen, ...
93
Voted
PET
2007
Springer
15 years 5 months ago
Pairing-Based Onion Routing
Abstract. This paper presents a novel use of pairing-based cryptography to improve circuit construction in onion routing anonymity networks. Instead of iteratively and interactivel...
Aniket Kate, Gregory M. Zaverucha, Ian Goldberg
CCS
2001
ACM
15 years 4 months ago
New Iterative Geometric Methods for Robust Perceptual Image Hashing
We propose a novel and robust hashing paradigm that uses iterative geometric techniques and relies on observations that main geometric features within an image would approximately ...
Mehmet Kivanç Mihçak, Ramarathnam Ve...
ICCSA
2005
Springer
15 years 5 months ago
A Formal Analysis of Fairness and Non-repudiation in the RSA-CEGD Protocol
Recently, Nenadi´c et al. (2004) proposed the RSA-CEGD protocol for certified delivery of e-goods. This is a relatively complex scheme based on verifiable and recoverable encryp...
Almudena Alcaide, Juan M. Estévez-Tapiador,...
POPL
2006
ACM
15 years 12 months ago
Decidability and proof systems for language-based noninterference relations
Noninterference is the basic semantical condition used to account for confidentiality and integrity-related properties in programming languages. There appears to be an at least im...
Mads Dam