Sciweavers

3228 search results - page 557 / 646
» Computationally Sound Proofs
Sort
View
SP
1990
IEEE
14 years 25 days ago
Probabilistic Interference
In recent times information flow and non-interference have become very popular concepts for expressing both integrity and privacy properties. We present the first general definitio...
James W. Gray III
B
2007
Springer
14 years 24 days ago
Security Policy Enforcement Through Refinement Process
Abstract. In the area of networks, a common method to enforce a security policy expressed in a high-level language is based on an ad-hoc and manual rewriting process [24]. We argue...
Nicolas Stouls, Marie-Laure Potet
CSFW
2009
IEEE
14 years 22 days ago
Authentication without Elision: Partially Specified Protocols, Associated Data, and Cryptographic Models Described by Code
Specification documents for real-world authentication protocols typically mandate some aspects of a protocol's behavior but leave other features optional or undefined. In add...
Phillip Rogaway, Till Stegers
ESWS
2007
Springer
14 years 21 days ago
Towards Novel Techniques for Reasoning in Expressive Description Logics based on Binary Decision Diagrams
We propose to design and study new techniques for description logic (DL) reasoning based on a prominent data structure that has been applied very successfully in various domains in...
Uwe Keller
ACNS
2004
Springer
167views Cryptology» more  ACNS 2004»
14 years 17 days ago
A Fully-Functional Group Signature Scheme over Only Known-Order Group
The concept of group signature allows a group member to sign message anonymously on behalf of the group. In the event of a dispute, a designated entity can reveal the identity of a...
Atsuko Miyaji, Kozue Umeda