Sciweavers

3486 search results - page 47 / 698
» On the Design and Security of RC2
Sort
View
SP
2008
IEEE
195views Security Privacy» more  SP 2008»
14 years 3 months ago
Automated Formal Analysis of a Protocol for Secure File Sharing on Untrusted Storage
We study formal security properties of a state-of-the-art protocol for secure file sharing on untrusted storage, in the automatic protocol verifier ProVerif. As far as we know, ...
Bruno Blanchet, Avik Chaudhuri
ECIS
2001
13 years 10 months ago
Web Security: The Emperor's New Armour
The World Wide Web originally provided no security services because it was not designed to support sensitive applications. As the Web evolved to become a platform for all types of...
Audun Jøsang, Peter M. Møllerud, Edd...
FDL
2004
IEEE
14 years 13 days ago
UML System-Level Analysis and Design of Secure Communication Schemes for Embedded Systems
In this work we develop a secure communication protocol in the context of a Remote Meter Reading (RMR) System. We first analyze existing standards in secure communication (e.g. IP...
Mauro Prevostini, Giuseppe Piscopo, I. Stefanini
ACSW
2007
13 years 10 months ago
Design Principles for Low Latency Anonymous Network Systems Secure against Timing Attacks
Low latency anonymous network systems, such as Tor, were considered secure against timing attacks when the threat model does not include a global adversary. In this threat model t...
Rungrat Wiangsripanawan, Willy Susilo, Reihaneh Sa...
DAC
2008
ACM
13 years 10 months ago
SHIELD: a software hardware design methodology for security and reliability of MPSoCs
Security of MPSoCs is an emerging area of concern in embedded systems. Security is jeopardized by code injection attacks, which are the most common types of software attacks. Prev...
Krutartha Patel, Sri Parameswaran