Sciweavers

1825 search results - page 29 / 365
» Cryptographic Securities Exchanges
Sort
View
77
Voted
IPL
2010
93views more  IPL 2010»
15 years 1 months ago
Compiling and securing cryptographic protocols
Protocol narrations are widely used in security as semi-formal notations to specify conversations between roles. We define a translation from a protocol narration to the sequence...
Yannick Chevalier, Michaël Rusinowitch
119
Voted
ICICS
2005
Springer
15 years 8 months ago
Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware
Software that covertly monitors a user’s actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and remov...
Debra L. Cook, Ricardo A. Baratto, Angelos D. Kero...
SP
2007
IEEE
137views Security Privacy» more  SP 2007»
15 years 8 months ago
A Cryptographic Decentralized Label Model
Information-flow security policies are an appealing way of specifying confidentiality and integrity policies in information systems. Most previous work on language-based securit...
Jeffrey A. Vaughan, Steve Zdancewic
83
Voted
EUROCRYPT
2009
Springer
15 years 7 months ago
On the Security Loss in Cryptographic Reductions
Chi-Jen Lu