Sciweavers

300 search results - page 7 / 60
» Formal Methods for Smartcard Security
Sort
View
FC
2005
Springer
98views Cryptology» more  FC 2005»
14 years 1 months ago
Secure Biometric Authentication for Weak Computational Devices
This paper presents computationally “lightweight” schemes for performing biometric authentication that carry out the comparison stage without revealing any information that can...
Mikhail J. Atallah, Keith B. Frikken, Michael T. G...
FMCO
2006
Springer
13 years 11 months ago
JACK - A Tool for Validation of Security and Behaviour of Java Applications
Gilles Barthe, Lilian Burdy, Julien Charles, Benja...
IJSSE
2011
127views more  IJSSE 2011»
13 years 2 months ago
A Formal Language for XML Authorisations Based on Answer Set Programming and Temporal Interval Logic Constraints
The Extensible Markup Language is susceptible to security breaches because it does not incorporate methods to protect the information it encodes. Our work presented in this paper f...
Sean Policarpio, Yan Zhang
CCS
2005
ACM
14 years 1 months ago
A model and architecture for pseudo-random generation with applications to /dev/random
We present a formal model and a simple architecture for robust pseudorandom generation that ensures resilience in the face of an observer with partial knowledge/control of the gen...
Boaz Barak, Shai Halevi
CCS
2004
ACM
14 years 28 days ago
Lessons learned using alloy to formally specify MLS-PCA trusted security architecture
In order to solve future Multi Level Security (MLS) problems, we have developed a solution based on the DARPA Polymorphous Computing Architecture (PCA). MLS-PCA uses a novel distr...
Brant Hashii