Sciweavers

2209 search results - page 88 / 442
» Language Based Secure Communication
Sort
View
SP
2007
IEEE
137views Security Privacy» more  SP 2007»
15 years 8 months ago
A Cryptographic Decentralized Label Model
Information-flow security policies are an appealing way of specifying confidentiality and integrity policies in information systems. Most previous work on language-based securit...
Jeffrey A. Vaughan, Steve Zdancewic
ENTCS
2008
125views more  ENTCS 2008»
15 years 2 months ago
Extending Lustre with Timeout Automata
This paper describes an extension to Lustre to support the analysis of globally asynchronous, locally synchronous (GALS) architectures. This extension consists of constructs for d...
Jimin Gao, Mike Whalen, Eric Van Wyk
121
Voted
MOBICOM
2006
ACM
15 years 8 months ago
An identity-based security framework For VANETs
We present a security framework for Vehicular Ad hoc Networks (VANETs), using identity-based cryptography, to provide authentication, confidentiality, non-repudiation and message...
Pandurang Kamat, Arati Baliga, Wade Trappe
143
Voted
AC
1998
Springer
15 years 6 months ago
The Search for the Holy Grail in Quantum Cryptography
Abstract. In 1982, Bennett and Brassard suggested a new way to provide privacy in long distance communications with security based on the correctness of the basic principles of qua...
Louis Salvail
127
Voted
SP
2007
IEEE
157views Security Privacy» more  SP 2007»
15 years 8 months ago
Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems
Many proposed low-latency anonymous communication systems have used various flow transformations such as traffic padding, adding cover traffic (or bogus packets), packet droppi...
Xinyuan Wang, Shiping Chen, Sushil Jajodia