Sciweavers

469 search results - page 39 / 94
» On Adversary Models and Compositional Security
Sort
View
GI
2009
Springer
14 years 9 days ago
A Game-Theoretic Model for Distributed Programming by Contract
: We present an extension of the programming-by-contract (PBC) paradigm to a concurrent and distributed environment. Classical PBC is characterized by absolute conformance of code ...
Anders Starcke Henriksen, Tom Hvitved, Andrzej Fil...
CARDIS
2010
Springer
159views Hardware» more  CARDIS 2010»
13 years 11 months ago
Modeling Privacy for Off-Line RFID Systems
This paper establishes a novel model for RFID schemes where readers are not continuously connected to the back office, but only periodically. Furthermore, adversaries are not only ...
Flavio D. Garcia, Peter van Rossum
SCN
2008
Springer
116views Communications» more  SCN 2008»
13 years 7 months ago
General Certificateless Encryption and Timed-Release Encryption
While recent timed-release encryption (TRE) schemes are implicitly supported by a certificateless encryption (CLE) mechanism, the security models of CLE and TRE differ and there is...
Sherman S. M. Chow, Volker Roth, Eleanor G. Rieffe...
SP
2003
IEEE
121views Security Privacy» more  SP 2003»
14 years 29 days ago
Specifying and Verifying Hardware for Tamper-Resistant Software
We specify a hardware architecture that supports tamper-resistant software by identifying an “idealized” hich gives the abstracted actions available to a single user program. ...
David Lie, John C. Mitchell, Chandramohan A. Thekk...
DIAU
2000
Springer
14 years 1 days ago
On Pseudonymization of Audit Data for Intrusion Detection
In multilaterally secure intrusion detection systems (IDS) anonymity and accountability are potentially conflicting requirements. Since IDS rely on audit data to detect violations...
Joachim Biskup, Ulrich Flegel