Sciweavers

216 search results - page 33 / 44
» Models and Proofs of Protocol Security: A Progress Report
Sort
View
NAR
2006
82views more  NAR 2006»
13 years 7 months ago
The RCSB PDB information portal for structural genomics
10 The RCSB Protein Data Bank (PDB) offers online tools, summary reports and target information related to the worldwide structural genomics initiatives from its portal at http://...
Andrei Kouranov, Lei Xie, Joanna de la Cruz, Li Ch...
CRYPTO
2009
Springer
166views Cryptology» more  CRYPTO 2009»
14 years 1 months ago
Public-Key Cryptosystems Resilient to Key Leakage
Most of the work in the analysis of cryptographic schemes is concentrated in abstract adversarial models that do not capture side-channel attacks. Such attacks exploit various for...
Moni Naor, Gil Segev
ASIACRYPT
2009
Springer
14 years 1 months ago
Security Notions and Generic Constructions for Client Puzzles
Computational puzzles are mildly difficult computational problems that require resources (processor cycles, memory, or both) to solve. Puzzles have found a variety of uses in secu...
Liqun Chen, Paul Morrissey, Nigel P. Smart, Bogdan...
WETICE
1998
IEEE
13 years 11 months ago
The Problem with Multiple Roots in Web Browsers - Certificate Masquerading
Much work is going into securing the public key infrastructure (PKI). Various models for trust exist; Pretty Good Privacy (PGP) and the Progressive-Constraint Trust model are exam...
James M. Hayes
ATVA
2009
Springer
89views Hardware» more  ATVA 2009»
14 years 1 months ago
A Data Symmetry Reduction Technique for Temporal-epistemic Logic
We present a data symmetry reduction approach for model temporal-epistemic logic. The technique abstracts the epistemic indistinguishably relation for the knowledge operators, and ...
Mika Cohen, Mads Dam, Alessio Lomuscio, Hongyang Q...