Sciweavers

783 search results - page 18 / 157
» On security proof of McCullagh
Sort
View
149
Voted
ECCC
2011
223views ECommerce» more  ECCC 2011»
14 years 11 months ago
A Full Proof of the BGW Protocol for Perfectly-Secure Multiparty Computation
Gilad Asharov, Yehuda Lindell
CSFW
2004
IEEE
15 years 8 months ago
By Reason and Authority: A System for Authorization of Proof-Carrying Code
We present a system, BLF, that combines an authorization logic based on the Binder language with a logical framework, LF, able to express semantic properties of programs. BLF is a...
Nathan Whitehead, Martín Abadi, George C. N...
FOSSACS
2004
Springer
15 years 9 months ago
Probabilistic Bisimulation and Equivalence for Security Analysis of Network Protocols
Abstract. Using a probabilistic polynomial-time process calculus designed for specifying security properties as observational equivalences, we develop a form of bisimulation that j...
Ajith Ramanathan, John C. Mitchell, Andre Scedrov,...
ATVA
2007
Springer
89views Hardware» more  ATVA 2007»
15 years 10 months ago
Policies and Proofs for Code Auditing
Abstract. Both proofs and trust relations play a role in security decisions, in particular in determining whether to execute a piece of code. We have developed a language, called B...
Nathan Whitehead, Jordan Johnson, Martín Ab...
ISSE
2010
14 years 11 months ago
Coloured Petri net refinement specification and correctness proof with Coq
In this work, we address the formalisation of symmetric nets, a subclass of coloured Petri nets, refinement in COQ. We first provide a formalisation of the net models, and of thei...
Christine Choppy, Micaela Mayero, Laure Petrucci