Sciweavers

1449 search results - page 12 / 290
» Secure and Efficient Metering
Sort
View
ACISP
2008
Springer
13 years 9 months ago
Efficient One-Round Key Exchange in the Standard Model
We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of...
Colin Boyd, Yvonne Cliff, Juan Manuel Gonzá...
SP
2010
IEEE
179views Security Privacy» more  SP 2010»
13 years 5 months ago
TrustVisor: Efficient TCB Reduction and Attestation
Jonathan M. McCune, Yanlin Li, Ning Qu, Zongwei Zh...
OOPSLA
2010
Springer
13 years 5 months ago
What can the GC compute efficiently?: a language for heap assertions at GC time
Christoph Reichenbach, Neil Immerman, Yannis Smara...