Sciweavers

576 search results - page 83 / 116
» Modeling Adversaries in a Logic for Security Protocol Analys...
Sort
View
CISC
2009
Springer
148views Cryptology» more  CISC 2009»
13 years 6 months ago
Using Strategy Objectives for Network Security Analysis
The anticipation game framework is an extension of attack graphs based on game theory. It is used to anticipate and analyze intruder and administrator concurrent interactions with ...
Elie Bursztein, John C. Mitchell
WWW
2007
ACM
14 years 9 months ago
Compiling cryptographic protocols for deployment on the web
Cryptographic protocols are useful for trust engineering in Web transactions. The Cryptographic Protocol Programming Language (CPPL) provides a model wherein trust management anno...
Jay A. McCarthy, Shriram Krishnamurthi, Joshua D. ...
WSC
1998
13 years 10 months ago
Discrete-Event Simulation for the Design and Evaluation of Physical Protection Systems
This paper explores the use of discrete-event simulation for the design and control of physical protection systems for fixed-site facilities housing items of significant value. It...
Sabina E. Jordan, Mark K. Snell, Marcella M. Madse...
ESORICS
2010
Springer
13 years 10 months ago
Formal Analysis of Privacy for Vehicular Mix-Zones
Safety critical applications for recently proposed vehicle to vehicle ad-hoc networks (VANETs) rely on a beacon signal, which poses a threat to privacy since it could allow a vehic...
Morten Dahl, Stéphanie Delaune, Graham Stee...
CONCUR
2007
Springer
14 years 3 months ago
Making Random Choices Invisible to the Scheduler
Abstract. When dealing with process calculi and automata which express both nondeterministic and probabilistic behavior, it is customary to introduce the notion of scheduler to res...
Konstantinos Chatzikokolakis, Catuscia Palamidessi