Sciweavers

107 search results - page 4 / 22
» A secure compiler for session abstractions
Sort
View
EPEW
2008
Springer
13 years 9 months ago
Partial Evaluation of PEPA Models for Fluid-Flow Analysis
Abstract. We present an application of partial evaluation to performance models expressed in the PEPA stochastic process algebra [1]. We partially evaluate the state-space of a PEP...
Allan Clark, Adam Duguid, Stephen Gilmore, Mirco T...
ICB
2009
Springer
156views Biometrics» more  ICB 2009»
13 years 5 months ago
Bipartite Biotokens: Definition, Implementation, and Analysis
Abstract. Cryptographic transactions form the basis of many common security systems found throughout computer networks. Supporting these transactions with biometrics is very desira...
Walter J. Scheirer, Terrance E. Boult
ESORICS
2007
Springer
14 years 1 months ago
Synthesizing Secure Protocols
Abstract. We propose a general transformation that maps a cryptographic protocol that is secure in an extremely weak sense (essentially in a model where no adversary is present) in...
Véronique Cortier, Bogdan Warinschi, Eugen ...
PKC
2000
Springer
84views Cryptology» more  PKC 2000»
13 years 11 months ago
Forward Secrecy and Its Application to Future Mobile Communications Security
Abstract. Perfect forward secrecy, one of the possible security features provided by key establishment protocols, concerns dependency of a session key upon long-term secret keys (s...
DongGook Park, Colin Boyd, Sang-Jae Moon
ESORICS
2012
Springer
11 years 10 months ago
Beyond eCK: Perfect Forward Secrecy under Actor Compromise and Ephemeral-Key Reveal
We show that it is possible to achieve perfect forward secrecy in two-message key exchange (KE) protocols that satisfy even stronger security properties than provided by the extend...
Cas J. F. Cremers, Michele Feltz