Sciweavers

1679 search results - page 12 / 336
» Security Properties and CSP
Sort
View
TALG
2010
110views more  TALG 2010»
13 years 6 months ago
Approximating fractional hypertree width
Fractional hypertree width is a hypergraph measure similar to tree width and hypertree width. Its algorithmic importance comes from the fact that, as shown in previous work [14], ...
Dániel Marx
FC
2007
Springer
128views Cryptology» more  FC 2007»
14 years 1 months ago
On Authentication with HMAC and Non-random Properties
Abstract. MAC algorithms can provide cryptographically secure authentication services. One of the most popular algorithms in commercial appli
Christian Rechberger, Vincent Rijmen
AAAI
2010
13 years 9 months ago
A First Practical Algorithm for High Levels of Relational Consistency
Consistency properties and algorithms for achieving them are at the heart of the success of Constraint Programming. In this paper, we study the relational consistency property R(,...
Shant Karakashian, Robert J. Woodward, Christopher...
TARK
2007
Springer
14 years 1 months ago
Preservation of epistemic properties in security protocol implementations
We introduce (i) a general class of security protocols with private channel as cryptographic primitive and (ii) a probabilistic epistemic logic to express properties of security pr...
Ron van der Meyden, Thomas Wilke
ESORICS
2004
Springer
14 years 1 months ago
Security Property Based Administrative Controls
Abstract. Access control languages which support administrative controls, and thus allow the ordinary permissions of a system to change, have traditionally been constructed with ï¬...
Jon A. Solworth, Robert H. Sloan