Sciweavers

243 search results - page 40 / 49
» LDYIS: a Framework for Model Checking Security Protocols
Sort
View
EUROCRYPT
2008
Springer
13 years 10 months ago
New Constructions for UC Secure Computation Using Tamper-Proof Hardware
The Universal Composability framework was introduced by Canetti to study the security of protocols which are concurrently executed with other protocols in a network environment. U...
Nishanth Chandran, Vipul Goyal, Amit Sahai
ICDCS
2005
IEEE
14 years 2 months ago
Filter Based Directory Replication: Algorithms and Performance
Directories have become an important component of the enterprise security and identity management middleware. This paper describes a novel filter based replication model for Light...
Apurva Kumar
ICALP
2005
Springer
14 years 1 months ago
Computationally Sound Implementations of Equational Theories Against Passive Adversaries
In this paper we study the link between formal and cryptographic models for security protocols in the presence of a passive adversary. In contrast to other works, we do not conside...
Mathieu Baudet, Véronique Cortier, Steve Kr...
ICSE
2005
IEEE-ACM
14 years 8 months ago
Automatic discovery of API-level exploits
We argue that finding vulnerabilities in software components is different from finding exploits against them. Exploits that compromise security often use several low-level details...
Vinod Ganapathy, Sanjit A. Seshia, Somesh Jha, Tho...
EATIS
2007
ACM
14 years 10 days ago
Analysing and enhancing business processes and IT-systems for mobile workforce automation: a framework approach
Mobile B2E-applications (business-to-employee) can add significant value to a company's business, when large workforce divisions are involved in the execution of certain busi...
Volker Gruhn, André Köhler