Sciweavers

5722 search results - page 12 / 1145
» Security Function Interactions
Sort
View
POPL
2001
ACM
14 years 9 months ago
Mobile values, new names, and secure communication
We study the interaction of the "new" construct with a rich but common form of (first-order) communication. This interaction is crucial in security protocols, which are ...
Cédric Fournet, Martín Abadi
JOC
2006
69views more  JOC 2006»
13 years 8 months ago
Characterization of Security Notions for Probabilistic Private-Key Encryption
The development of precise definitions of security for encryption, as well as a detailed understanding of their relationships, has been a major area of research in modern cryptogr...
Jonathan Katz, Moti Yung
ICC
2007
IEEE
100views Communications» more  ICC 2007»
14 years 2 months ago
S.T.R.E.S.S. : Stress Testing and Reverse Engineering for System Security
— In modern wireless networks the functions included into layer II have to deal with complex problems, such as security and access control, that were previously demanded to upper...
Matteo Rosi, Leonardo Maccari, Romano Fantacci
PROVSEC
2007
Springer
14 years 2 months ago
Does Secure Time-Stamping Imply Collision-Free Hash Functions?
Ahto Buldas, Aivo Jürgenson
BMCBI
2010
122views more  BMCBI 2010»
13 years 3 months ago
Functional enrichment analyses and construction of functional similarity networks with high confidence function prediction by PF
Background: A new paradigm of biological investigation takes advantage of technologies that produce large high throughput datasets, including genome sequences, interactions of pro...
Troy Hawkins, Meghana Chitale, Daisuke Kihara