Sciweavers

5255 search results - page 83 / 1051
» Formal Methods for Privacy
Sort
View
GI
2009
Springer
14 years 2 months ago
Classifying Privacy and Verifiability Requirements for Electronic Voting
Abstract: Voter privacy and verifiability are fundamental security concepts for electronic voting. Existing literature on electronic voting provides many definitions and interpreta...
Lucie Langer, Axel Schmidt, Melanie Volkamer, Joha...
ESORICS
2005
Springer
14 years 3 months ago
Machine-Checked Security Proofs of Cryptographic Signature Schemes
Abstract. Formal methods have been extensively applied to the certification of cryptographic protocols. However, most of these works make the perfect cryptography assumption, i.e....
Sabrina Tarento
CCS
2003
ACM
14 years 3 months ago
Secure protocol composition
This paper continues the program initiated in [5], towards a derivation system for security protocols. The general idea is that complex protocols can be formally derived, starting...
Anupam Datta, Ante Derek, John C. Mitchell, Dusko ...