Sciweavers

349 search results - page 4 / 70
» Compositional Security for Task-PIOAs
Sort
View
CSFW
2012
IEEE
11 years 11 months ago
Verifying Privacy-Type Properties in a Modular Way
—Formal methods have proved their usefulness for analysing the security of protocols. In this setting, privacy-type security properties (e.g. vote-privacy, anonymity, unlinkabili...
Myrto Arapinis, Vincent Cheval, Stéphanie D...
EUROCRYPT
2011
Springer
13 years 18 hour ago
Concurrent Composition in the Bounded Quantum Storage Model
We define the BQS-UC model, a variant of the UC model, that deals with protocols in the bounded quantum storage model. We present a statistically secure commitment protocol in th...
Dominique Unruh
CCS
2003
ACM
14 years 1 months ago
A compositional framework for access control policies enforcement
François Siewe, Antonio Cau, Hussein Zedan
OOPSLA
2000
Springer
14 years 3 days ago
Exclusion for composite objects
James Noble, David Holmes, John Potter