Sciweavers

5084 search results - page 51 / 1017
» Proving Possibility Properties
Sort
View
CORR
2010
Springer
151views Education» more  CORR 2010»
15 years 3 months ago
How to prevent type-flaw attacks on security protocols under algebraic properties
In this paper, we prove that type-tagging prevents type-flaw attacks on security protocols that use the Exclusive-OR operator as our main contribution. Our proof method is general ...
Sreekanth Malladi, Pascal Lafourcade
CORR
2006
Springer
103views Education» more  CORR 2006»
15 years 3 months ago
Expressing Security Properties Using Selective Interleaving Functions
McLean's notion of Selective Interleaving Functions (SIFs) is perhaps the bestknown attempt to construct a framework for expressing various security properties. We examine th...
Joseph Y. Halpern, Sabina Petride
CSFW
1996
IEEE
15 years 7 months ago
Comparing Two Information Flow Security Properties
In this paper we compare two information flow security properties: the lazy security (L-Sec) [11] and the Bisimulation Non-deducibility on Compositions (BNDC) [4]. To make this we...
Riccardo Focardi
ICECCS
2007
IEEE
129views Hardware» more  ICECCS 2007»
15 years 7 months ago
Automated Verification of Shape, Size and Bag Properties
In recent years, separation logic has emerged as a contender for formal reasoning of heap-manipulating imperative programs. Recent works have focused on specialised provers that a...
Wei-Ngan Chin, Cristina David, Huu Hai Nguyen, She...
ICISC
2007
120views Cryptology» more  ICISC 2007»
15 years 4 months ago
A Note About the Traceability Properties of Linear Codes
We characterize the traceability properties of linear codes. It is well known that any code of length n and minimum distance d is a c-TA code if c2 < n/(n−d). In this paper, w...
Marcel Fernandez, Josep Cotrina Navau, Miguel Sori...