Sciweavers

518 search results - page 58 / 104
» Abstract Interpretation-Based Protection
Sort
View
CHES
2000
Springer
135views Cryptology» more  CHES 2000»
15 years 6 months ago
Differential Power Analysis in the Presence of Hardware Countermeasures
Abstract. The silicon industry has lately been focusing on side channel attacks, that is attacks that exploit information that leaks from the physical devices. Although different c...
Christophe Clavier, Jean-Sébastien Coron, N...
EUROCRYPT
1995
Springer
15 years 6 months ago
Verifiable Signature Sharing
Abstract. We introduce Verifiable Signature Sharing (VCS), a cryptographic primitive for protecting digital signatures. VCS enables the holder of a digitally signed document, who m...
Matthew K. Franklin, Michael K. Reiter
EVOW
2009
Springer
15 years 5 months ago
Testing Detector Parameterization Using Evolutionary Exploit Generation
Abstract. The testing of anomaly detectors is considered from the perspective of a Multi-objective Evolutionary Exploit Generator (EEG). Such a framework provides users of anomaly ...
Hilmi Günes Kayacik, A. Nur Zincir-Heywood, M...
ASM
2008
ASM
15 years 4 months ago
A Concept-Driven Construction of the Mondex Protocol Using Three Refinements
Abstract. The Mondex case study concerns the formal development and verification of an electronic purse protocol. Several groups have worked on its specification and mechanical ver...
Gerhard Schellhorn, Richard Banach
ICWE
2010
Springer
15 years 4 months ago
Tools for Modeling and Generating Safe Interface Interactions in Web Applications
Abstract. Current Web applications embed sophisticated user interfaces and business logic. The original interaction paradigm of the Web with static content pages that are browsed b...
Marco Brambilla, Jordi Cabot, Michael Grossniklaus