Sciweavers

370 search results - page 39 / 74
» Limits of Constructive Security Proofs
Sort
View
ACISP
2006
Springer
13 years 12 months ago
Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security
Efficient authentication is one of important security requirements in mobile ad hoc network (MANET) routing systems. The techniques of digital signatures are generally considered a...
Shidi Xu, Yi Mu, Willy Susilo
POPL
2001
ACM
14 years 8 months ago
Mobile values, new names, and secure communication
We study the interaction of the "new" construct with a rich but common form of (first-order) communication. This interaction is crucial in security protocols, which are ...
Cédric Fournet, Martín Abadi
EUROCRYPT
2010
Springer
14 years 28 days ago
Public-Key Encryption in the Bounded-Retrieval Model
We construct the first public-key encryption scheme in the Bounded-Retrieval Model (BRM), providing security against various forms of adversarial “key leakage” attacks. In th...
Joël Alwen, Yevgeniy Dodis, Moni Naor, Gil Se...
JAR
2006
99views more  JAR 2006»
13 years 8 months ago
An Integrated Approach to High Integrity Software Verification
Using automated reasoning techniques, we tackle the niche activity of proving that a program is free from run-time exceptions. Such a property is particularly valuable in high inte...
Andrew Ireland, Bill J. Ellis, Andrew Cook, Roderi...
MOC
2010
13 years 2 months ago
Approximation of nonlinear wave equations with nonstandard anisotropic growth conditions
Weak solutions for nonlinear wave equations involving the p(x)-Laplacian, for p : (1, ) are constructed as appropriate limits of solutions of an implicit finite element discretiz...
Jonas Haehnle, Andreas Prohl