Sciweavers

2043 search results - page 87 / 409
» Reasoning About Security Models
Sort
View
ESORICS
2005
Springer
14 years 4 months ago
Browser Model for Security Analysis of Browser-Based Protocols
Currently, many industrial initiatives focus on web-based applications. In this context an important requirement is that the user should only rely on a standard web browser. Hence...
Thomas Groß, Birgit Pfitzmann, Ahmad-Reza Sa...
ICRA
2010
IEEE
148views Robotics» more  ICRA 2010»
13 years 8 months ago
An integrated probabilistic model for scan-matching, moving object detection and motion estimation
Abstract-- This paper presents a novel framework for integrating fundamental tasks in robotic navigation through a statistical inference procedure. A probabilistic model that joint...
Joop van de Ven, Fabio Ramos, Gian Diego Tipaldi
CCS
2006
ACM
14 years 2 months ago
Secure information flow with random assignment and encryption
Type systems for secure information flow aim to prevent a program from leaking information from variables classified as H to variables classified as L. In this work we extend such...
Geoffrey Smith
FAC
2007
128views more  FAC 2007»
13 years 10 months ago
Verifying a signature architecture: a comparative case study
Abstract. We report on a case study in applying different formal methods to model and verify an architecture for administrating digital signatures. The architecture comprises seve...
David A. Basin, Hironobu Kuruma, Kunihiko Miyazaki...
TC
2008
13 years 10 months ago
On the Computational Security of a Distributed Key Distribution Scheme
In a distributed key distribution scheme, a set of servers help a set of users in a group to securely obtain a common key. Security means that an adversary who corrupts some server...
Vanesa Daza, Javier Herranz, Germán S&aacut...