Sciweavers

1407 search results - page 174 / 282
» Systems Theory Model for Information Security
Sort
View
CCS
2010
ACM
13 years 5 months ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...
EUROCRYPT
2010
Springer
14 years 1 months ago
Public-Key Encryption in the Bounded-Retrieval Model
We construct the first public-key encryption scheme in the Bounded-Retrieval Model (BRM), providing security against various forms of adversarial “key leakage” attacks. In th...
Joël Alwen, Yevgeniy Dodis, Moni Naor, Gil Se...
WOTUG
2007
13 years 9 months ago
Modeling and Analysis of the AMBA Bus Using CSP and B
Abstract. In this paper, we present a formal model and analysis of the AMBA Advanced High-performance Bus (AHB) on-chip bus. The model is given in CSP B—an integration of the pro...
Alistair A. McEwan, Steve Schneider
VIROLOGY
2008
84views more  VIROLOGY 2008»
13 years 8 months ago
Formal affordance-based models of computer virus reproduction
We present a novel classification of computer viruses using a formalised notion of reproductive models based on Gibson's theory of affordances. A computer virus reproduction ...
Matt Webster, Grant Malcolm
WPES
2006
ACM
14 years 2 months ago
Private social network analysis: how to assemble pieces of a graph privately
Connections in distributed systems, such as social networks, online communities or peer-to-peer networks, form complex graphs. These graphs are of interest to scientists in field...
Keith B. Frikken, Philippe Golle