Sciweavers

4731 search results - page 42 / 947
» Securing Interactive Programs
Sort
View
CRYPTO
1995
Springer
89views Cryptology» more  CRYPTO 1995»
14 years 9 days ago
Secure Signature Schemes based on Interactive Protocols
Ronald Cramer, Ivan Damgård
CSFW
2007
IEEE
14 years 20 days ago
Automaton-based Confidentiality Monitoring of Concurrent Programs
Noninterference is typically used as a baseline security policy to formalize confidentiality of secret information manipulated by a program. In contrast to static checking of noni...
Gurvan Le Guernic