Sciweavers

5722 search results - page 117 / 1145
» Security Function Interactions
Sort
View
FSTTCS
2009
Springer
14 years 3 months ago
Simulation based security in the applied pi calculus
We present a symbolic framework for refinement and composition of security protocols. ework uses the notion of ideal functionalities. These are abstract systems which are secure b...
Stéphanie Delaune, Steve Kremer, Olivier Pe...
ACISP
2007
Springer
14 years 3 months ago
Hash-and-Sign with Weak Hashing Made Secure
Abstract. Digital signatures are often proven to be secure in the random oracle model while hash functions deviate more and more from this idealization. Liskov proposed to model a ...
Sylvain Pasini, Serge Vaudenay
ECAI
2008
Springer
13 years 10 months ago
Learning Functional Object-Categories from a Relational Spatio-Temporal Representation
Abstract. We propose a framework that learns functional objectes from spatio-temporal data sets such as those abstracted from video. The data is represented as one activity graph t...
Muralikrishna Sridhar, Anthony G. Cohn, David C. H...
PROVSEC
2009
Springer
14 years 3 months ago
Chosen-Ciphertext Secure RSA-Type Cryptosystems
This paper explains how to design fully secure RSA-type cryptosystems from schemes only secure against passive attacks, in the standard model. We rely on instance-independence assu...
Benoît Chevallier-Mames, Marc Joye
IEEEIAS
2007
IEEE
14 years 3 months ago
Team Edit Automata for Testing Security Property
This paper introduces a mathematical model, called Team Edit Automata, for evaluating software security properties. We use the model to describe security properties and their corr...
Zhenrong Yang, Aiman Hanna, Mourad Debbabi