Sciweavers

107 search results - page 12 / 22
» A secure compiler for session abstractions
Sort
View
ISSE
2008
13 years 9 months ago
Challenges for the Protection of Critical ICT-Based Financial Infrastructures
Abstract: This paper, entitled Challenges for the Protection of Critical ICTBased Financial Infrastructures for the next 5 years, will describe the outcomes of a recently held work...
Bernhard M. Hämmerli, Henning H. Arendt
ICFEM
2009
Springer
13 years 5 months ago
Implementing a Direct Method for Certificate Translation
Abstract. Certificate translation is a method that transforms certificates of source programs into certificates of their compilation. It provides strong guarantees on low-level cod...
Gilles Barthe, Benjamin Grégoire, Sylvain H...
IWSEC
2009
Springer
14 years 2 months ago
ID-Based Group Password-Authenticated Key Exchange
Abstract—Password-authenticated key exchange (PAKE) protocols are designed to be secure even when the secret key used for authentication is a human-memorable password. In this pa...
Xun Yi, Raylin Tso, Eiji Okamoto
EUROPKI
2009
Springer
13 years 5 months ago
Automatic Generation of Sigma-Protocols
Efficient zero-knowledge proofs of knowledge (ZK-PoK) are basic building blocks of many cryptographic applications such as identification schemes, group signatures, and secure mult...
Endre Bangerter, Thomas Briner, Wilko Henecka, Ste...
ICALP
2005
Springer
14 years 1 months ago
Combining Intruder Theories
Abstract. Most of the decision procedures for symbolic analysis of protocols are limited to a fixed set of algebraic operators associated with a fixed intruder theory. Examples o...
Yannick Chevalier, Michaël Rusinowitch