Sciweavers

5255 search results - page 46 / 1051
» Formal Methods for Privacy
Sort
View
FM
2006
Springer
135views Formal Methods» more  FM 2006»
14 years 1 months ago
A Story About Formal Methods Adoption by a Railway Signaling Manufacturer
Stefano Bacherini, Alessandro Fantechi, Matteo Tem...
CSFW
2007
IEEE
14 years 4 months ago
A Formal Theory of Key Conjuring
Key conjuring is the process by which an attacker obtains an unknown, encrypted key by repeatedly calling a cryptographic API function with random values in place of keys. We prop...
Véronique Cortier, Stéphanie Delaune...
CCS
2005
ACM
14 years 3 months ago
Deciding security of protocols against off-line guessing attacks
We provide an effective procedure for deciding the existence of off-line guessing attacks on security protocols, for a bounded number of sessions. The procedure consists of a co...
Mathieu Baudet
ESORICS
2008
Springer
13 years 11 months ago
Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks
Abstract. We propose a novel approach for quantifying a system's resistance to unknown-message side-channel attacks. The approach is based on a measure of the secret informati...
Michael Backes, Boris Köpf