Back to Results
First PageMeta Content
Cryptographic protocols / Object-oriented programming / Communications protocol / Data transmission / Protocols / Trusted system / Cryptography / Universal composability / Computer security / Computing / Security / Data


On Adversary Models and Compositional Security Anupam Datta, Jason Franklin, Deepak Garg, Limin Jia and Dilsun Kaynar Carnegie Mellon University Abstract We present a representative development in the science of security
Add to Reading List

Document Date: 2014-11-11 20:30:18


Open Document

File Size: 280,02 KB

Share Result on Facebook

City

Oakland / /

Company

Modeling Systems / /

Currency

USD / /

Event

FDA Phase / /

IndustryTerm

real systems / trusted computing abilities / Contemporary systems / dedicated co-processor / software stack / secure systems / cryptographic protocols / web platform / web mashups / web browsers / technology / network security protocol / realistic systems / trusted computing platforms / tamper-proof hardware / trusted computing / co-processor / security protocols / os services / energy / /

OperatingSystem

Unix / /

Organization

Carnegie Mellon University / /

Person

Michael Steiner / Bob / Suresh Chari / John C. Mitchell / Ante Derek / Alice / Limin Jia / Sagar Chaki / Dusko Pavlovic / Shai Halevi / Arnab Roy / Deepak Garg / Leslie Lamport / Abadi Lamport / Anupam Datta / Ai / Birgit Pfitzmann / Wietse Venema / Arvind Seshadri / Jason Franklin / Dilsun Kaynar / /

Position

administrator / representative / /

Product

A1 / /

PublishedMedium

Cryptology ePrint Archive / /

Technology

encryption / virtual machine / dedicated co-processor / flow control / SRTM protocol / Unix / network security protocol / Trusted Computing technology / security protocols / DOM / operating system / Document Object Model / operating systems / access control list / network protocols / /

URL

http /

SocialTag