Sciweavers

5488 search results - page 68 / 1098
» On the Secure Implementation of Security Protocols
Sort
View
131
Voted
TOCS
2002
70views more  TOCS 2002»
15 years 3 months ago
Secure program partitioning
This paper presents secure program partitioning, a language-based technique for protecting confidential data during computation in distributed systems containing mutually untruste...
Steve Zdancewic, Lantian Zheng, Nathaniel Nystrom,...
CCS
2006
ACM
15 years 7 months ago
Modelling the relative strength of security protocols
In this paper, we present a way to think about the relative strength of security protocols using SoS, a lattice-theoretic representation of security strength. In particular, we di...
Ho Chung, Clifford Neuman
92
Voted
CSFW
2008
IEEE
15 years 10 months ago
Refinement Types for Secure Implementations
Jesper Bengtson, Karthikeyan Bhargavan, Céd...
ATVA
2007
Springer
134views Hardware» more  ATVA 2007»
15 years 7 months ago
Formal Modeling and Verification of High-Availability Protocol for Network Security Appliances
One of the prerequisites for information society is secure and reliable communication among computing systems. Accordingly, network security appliances become key components of inf...
Moonzoo Kim