Sciweavers

5722 search results - page 138 / 1145
» Security Function Interactions
Sort
View
CCS
2009
ACM
14 years 28 days ago
On lightweight mobile phone application certification
Users have begun downloading an increasingly large number of mobile phone applications in response to advancements in handsets and wireless networks. The increased number of appli...
William Enck, Machigar Ongtang, Patrick Drew McDan...
CGF
2000
74views more  CGF 2000»
13 years 8 months ago
Wavelet Radiative Transfer and Surface Interaction
Recently, there has been considerable interest in the representation of radiance in terms of wavelet basis functions. We will present a coordinate system called Nusselt coordinate...
Robert R. Lewis, Alain Fournier
PKC
2010
Springer
150views Cryptology» more  PKC 2010»
14 years 27 days ago
Security of Encryption Schemes in Weakened Random Oracle Models
Liskov proposed several weakened versions of the random oracle model, called weakened random oracle models (WROMs), to capture the vulnerability of ideal compression functions, wh...
Akinori Kawachi, Akira Numayama, Keisuke Tanaka, K...
SAFECOMP
2009
Springer
14 years 1 months ago
A Foundation for Requirements Analysis of Dependable Software
We present patterns for expressing dependability requirements, such as confidentiality, integrity, availability, and reliability. The paper considers random faults as well as cert...
Denis Hatebur, Maritta Heisel
CCS
2008
ACM
13 years 11 months ago
Cryptographically verified implementations for TLS
We intend to narrow the gap between concrete implementations of cryptographic protocols and their verified models. We develop and verify a small functional implementation of the T...
Karthikeyan Bhargavan, Cédric Fournet, Rica...