Sciweavers

258 search results - page 10 / 52
» Securing Provenance
Sort
View
MOZ
2004
Springer
14 years 3 months ago
The Oz-E Project: Design Guidelines for a Secure Multiparadigm Programming Language
Abstract. The design and implementation of a capability secure multiparadigm language should be guided from its conception by proven principles of secure language design. In this p...
Fred Spiessens, Peter Van Roy
IJWMC
2006
112views more  IJWMC 2006»
13 years 10 months ago
Security mechanisms, attacks and security enhancements for the IEEE 802.11 WLANs
: Wired Equivalent Privacy (WEP) protocol was adopted to protect authorised users from unauthorised access and eavesdropping in the IEEE 802.11 wireless LANs. It has been proven th...
Yang Xiao, Chaitanya Bandela, Xiaojiang Du, Yi Pan...
ESORICS
2003
Springer
14 years 3 months ago
Initiator-Resilient Universally Composable Key Exchange
Abstract. Key exchange protocols in the setting of universal composability are investigated. First we show that the ideal functionality FKE of [9] cannot be realized in the presenc...
Dennis Hofheinz, Jörn Müller-Quade, Rain...
CONEXT
2008
ACM
13 years 12 months ago
Packet-dropping adversary identification for data plane security
Until recently, the design of packet dropping adversary identification protocols that are robust to both benign packet loss and malicious behavior has proven to be surprisingly el...
Xin Zhang, Abhishek Jain 0002, Adrian Perrig
ACSW
2003
13 years 11 months ago
Provably Secure Key Exchange: An Engineering Approach
We promote an engineering approach to design of provably secure key exchange protocols. Using the model of Canetti and Krawczyk we present a systematic method to arrive at efficie...
Yiu Shing Terry Tin, Colin Boyd, Juanma Gonz&aacut...