Sciweavers

650 search results - page 75 / 130
» Privacy in Non-private Environments
Sort
View
CSFW
2006
IEEE
14 years 2 months ago
Cryptographically Sound Theorem Proving
We describe a faithful embedding of the Dolev-Yao model of Backes, Pfitzmann, and Waidner (CCS 2003) in the theorem prover Isabelle/HOL. This model is cryptographically sound in ...
Christoph Sprenger, Michael Backes, David A. Basin...
CSFW
2006
IEEE
14 years 2 months ago
A Framework for Establishing Decentralized Secure Coalitions
A coalition provides a virtual space across a network that allows its members to interact in a transparent manner. Coalitions may be formed for a variety of purposes. These range ...
Hongbin Zhou, Simon N. Foley
CSFW
2006
IEEE
14 years 2 months ago
Simulation-Based Security with Inexhaustible Interactive Turing Machines
Recently, there has been much interest in extending models for simulation-based security in such a way that the runtime of protocols may depend on the length of their input. Findi...
Ralf Küsters
MICRO
2006
IEEE
114views Hardware» more  MICRO 2006»
14 years 2 months ago
Authentication Control Point and Its Implications For Secure Processor Design
Secure processor architecture enables tamper-proof protection on software that addresses many difficult security problems such as reverse-engineering prevention, trusted computing...
Weidong Shi, Hsien-Hsin S. Lee
CSCW
2006
ACM
14 years 2 months ago
Providing artifact awareness to a distributed group through screen sharing
Despite the availability of awareness servers and casual interaction systems, distributed groups still cannot maintain artifact awareness – the easy awareness of the documents, ...
Kimberly Tee, Saul Greenberg, Carl Gutwin