Sciweavers

2358 search results - page 233 / 472
» A Secure Pervasive Environment
Sort
View
IANDC
2008
120views more  IANDC 2008»
13 years 10 months ago
A framework for compositional verification of security protocols
Automatic security protocol analysis is currently feasible only for small protocols. Since larger protocols quite often are composed of many small protocols, compositional analysi...
Suzana Andova, Cas J. F. Cremers, Kristian Gj&osla...
MVA
1998
117views Computer Vision» more  MVA 1998»
13 years 10 months ago
A system for a new two-dimensional code: Secure 2D code
Abstract. A new 2D code called Secure 2D code is designed in this paper, both encoder and decoder are also proposed. Secure 2D code can store any kind of data and provides high sec...
Chung-Tsai Yeh, Ling-Hwei Chen
ACSAC
2010
IEEE
13 years 8 months ago
A framework for testing hardware-software security architectures
New security architectures are difficult to prototype and test at the design stage. Fine-grained monitoring of the interactions between hardware, the operating system, and applica...
Jeffrey S. Dwoskin, Mahadevan Gomathisankaran, Yu-...
ASIAN
2009
Springer
269views Algorithms» more  ASIAN 2009»
13 years 8 months ago
Noninterference with Dynamic Security Domains and Policies
Abstract. Language-based information flow analysis is used to statically examine a program for information flows between objects of different security domains, and to verify these ...
Robert Grabowski, Lennart Beringer
IACR
2011
147views more  IACR 2011»
12 years 10 months ago
Adaptive Security of Concurrent Non-Malleable Zero-Knowledge
A zero-knowledge protocol allows a prover to convince a verifier of the correctness of a statement without disclosing any other information to the verifier. It is a basic tool a...
Zhenfu Cao, Zongyang Zhang, Yunlei Zhao