Sciweavers

1679 search results - page 92 / 336
» Security Properties and CSP
Sort
View
JCS
2002
94views more  JCS 2002»
13 years 9 months ago
Model-Based Analysis of Configuration Vulnerabilities
Vulnerability analysis is concerned with the problem of identifying weaknesses in computer systems that can be exploited to compromise their security. In this paper we describe a ...
C. R. Ramakrishnan, R. C. Sekar
IPL
2011
130views more  IPL 2011»
13 years 5 months ago
On the cryptanalysis of the hash function Fugue: Partitioning and inside-out distinguishers
Fugue is an intriguing hash function design with a novel shift-register based compression structure and has formal security proofs e.g. against collision attacks. In this paper, w...
Jean-Philippe Aumasson, Raphael C.-W. Phan
CISC
2007
Springer
133views Cryptology» more  CISC 2007»
14 years 4 months ago
Unlinkable Randomizable Signature and Its Application in Group Signature
We formalize a generic method of constructing efficient group signatures, specifically, we define new notions of unlinkable randomizable signature, indirectly signable signature ...
Sujing Zhou, Dongdai Lin
ESWS
2009
Springer
14 years 4 months ago
Middleware for Automated Implementation of Security Protocols
We propose a middleware for automated implementation of security protocols for Web services. The proposed middleware consists of two main layers: the communication layer and the se...
Béla Genge, Piroska Haller
ETFA
2008
IEEE
14 years 4 months ago
Functional safety and system security in automation systems - a life cycle model
Industrial and building automation systems are more and more important in industry and buildings. New services and novel fields of application call for dependable systems. Two ver...
Thomas Novak, Albert Treytl