Sciweavers

5722 search results - page 15 / 1145
» Security Function Interactions
Sort
View
OOPSLA
2004
Springer
14 years 1 months ago
greenfoot: combining object visualisation with interaction
Poul Henriksen, Michael Kölling
CSFW
2006
IEEE
14 years 2 months ago
Information-Flow Security for Interactive Programs
Abstract. Interactive programs allow users to engage in input and output throughout execution. The ubiquity of such programs motivates the development of models for reasoning about...
Kevin R. O'Neill, Michael R. Clarkson, Stephen Cho...
CSFW
2012
IEEE
11 years 11 months ago
Securing Interactive Programs
Abstract—This paper studies the foundations of informationflow security for interactive programs. Previous research assumes that the environment is total, that is, it must alway...
Willard Rafnsson, Daniel Hedin, Andrei Sabelfeld
CRYPTO
2008
Springer
70views Cryptology» more  CRYPTO 2008»
13 years 10 months ago
Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers
We propose a family of compression functions built from fixed-key blockciphers and investigate their collision and preimage security in the ideal-cipher model. The constructions ha...
Phillip Rogaway, John P. Steinberger