Sciweavers

433 search results - page 34 / 87
» Administrative and Public Verifiability: Can We Have Both
Sort
View
CONCUR
2007
Springer
13 years 11 months ago
Decidability Results for Well-Structured Transition Systems with Auxiliary Storage
Abstract. We consider the problem of verifying the safety of wellstructured transition systems (WSTS) with auxiliary storage. WSTSs with storage are automata that have (possibly) i...
Rohit Chadha, Mahesh Viswanathan
PROVSEC
2007
Springer
14 years 1 months ago
CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts
In a threshold broadcast encryption scheme, a sender chooses (ad-hoc) a set of n receivers and a threshold t, and then encrypts a message by using the public keys of all the recei...
Vanesa Daza, Javier Herranz, Paz Morillo, Carla R&...
ERSHOV
2006
Springer
13 years 9 months ago
Security for Multithreaded Programs Under Cooperative Scheduling
Abstract. Information flow exhibited by multithreaded programs is subtle because the attacker may exploit scheduler properties when deducing secret information from publicly observ...
Alejandro Russo, Andrei Sabelfeld
SERP
2003
13 years 9 months ago
Mappings between Object-Oriented Technology and Architecture-Based Models
In recent publications, two prominent approaches can be found which deal with the complexity of large software systems. First, there is the object–oriented approach, where ”ob...
Peter Tabeling, Bernhard Gröne
TCS
2008
13 years 7 months ago
A simple transitive signature scheme for directed trees
Transitive signatures allow a signer to authenticate edges in a graph in such a way that anyone, given the public key and two signatures on adjacent edges (i, j) and (j, k), can c...
Gregory Neven