Security Properties

Results: 169



#Item
1Cryptographic Hardware (named Myst) that enables cryptographic devices to maintain their security properties in the from presence of malicious hardware components. UnUntrusted Components like prior mitigation efforts tha

Cryptographic Hardware (named Myst) that enables cryptographic devices to maintain their security properties in the from presence of malicious hardware components. UnUntrusted Components like prior mitigation efforts tha

Add to Reading List

Source URL: backdoortolerance.org

Language: English - Date: 2018-03-13 07:04:44
2Some issues in verifying e-voting systems Mark D. Ryan ● Present-day e-voting offers few security properties [KohnoStubblefieldRubinWallach2004] compared to what is desirable:

Some issues in verifying e-voting systems Mark D. Ryan ● Present-day e-voting offers few security properties [KohnoStubblefieldRubinWallach2004] compared to what is desirable:

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2010-03-26 10:57:07
    3Model checking security properties of control flow graphs Fr´ed´eric Besson Thomas Jensen IRISA/CNRS Campus de Beaulieu FRennes Cedex

    Model checking security properties of control flow graphs Fr´ed´eric Besson Thomas Jensen IRISA/CNRS Campus de Beaulieu FRennes Cedex

    Add to Reading List

    Source URL: people.rennes.inria.fr

    Language: English - Date: 2014-09-03 04:27:28
      4Formal Reasoning about Physical Properties of Security Protocols DAVID BASIN, SRDJAN CAPKUN, PATRICK SCHALLER, and BENEDIKT SCHMIDT ETH Zurich, Switzerland  Traditional security protocols are mainly concerned with authen

      Formal Reasoning about Physical Properties of Security Protocols DAVID BASIN, SRDJAN CAPKUN, PATRICK SCHALLER, and BENEDIKT SCHMIDT ETH Zurich, Switzerland Traditional security protocols are mainly concerned with authen

      Add to Reading List

      Source URL: www.inf.ethz.ch

      Language: English - Date: 2011-09-22 05:55:49
        5Breakout group: How can we design systems with known security properties? NSF/IARPA/NSA Workshop on the Science of Security November 17-18, 2008

        Breakout group: How can we design systems with known security properties? NSF/IARPA/NSA Workshop on the Science of Security November 17-18, 2008

        Add to Reading List

        Source URL: sos.cs.virginia.edu

        Language: English - Date: 2008-11-20 14:47:21
          6Technical Report no. 2004–08  Formalisation and Verification of JAVA CARD Security Properties in Dynamic Logic

          Technical Report no. 2004–08 Formalisation and Verification of JAVA CARD Security Properties in Dynamic Logic

          Add to Reading List

          Source URL: ceres.hh.se

          Language: English - Date: 2015-05-16 14:10:32
            7DEEPSEC: Deciding Equivalence Properties in Security Protocols Theory and Practice Vincent Cheval, Steve Kremer, Itsaka Rakotonirina Inria & LORIA  Abstract—Automated verification has become an essential part

            DEEPSEC: Deciding Equivalence Properties in Security Protocols Theory and Practice Vincent Cheval, Steve Kremer, Itsaka Rakotonirina Inria & LORIA Abstract—Automated verification has become an essential part

            Add to Reading List

            Source URL: anr17-tecap.gforge.inria.fr

            Language: English - Date: 2018-02-12 05:14:30
              8Arthur Gervais 	 	I	 am	 motivated	 by	 revolutionizing	 how	 society	 trades	 and	 interacts.	 Bitcoin	 and	 the security	properties	of	its	blockchain	provide	technical	means	to	catalyze	societal	evolution.	 	My	 resear

              Arthur Gervais I am motivated by revolutionizing how society trades and interacts. Bitcoin and the security properties of its blockchain provide technical means to catalyze societal evolution. My resear

              Add to Reading List

              Source URL: www.arthurgervais.com

              Language: English - Date: 2016-11-14 10:46:36
              9Abstract of “Static Analyses of Cryptographic Protocols” by Jay McCarthy, Ph.D., Brown University, May 2009 Most protocol analyses only address security properties. However, other properties are important and can inc

              Abstract of “Static Analyses of Cryptographic Protocols” by Jay McCarthy, Ph.D., Brown University, May 2009 Most protocol analyses only address security properties. However, other properties are important and can inc

              Add to Reading List

              Source URL: jeapostrophe.github.io

              - Date: 2018-04-03 12:30:31
                10Analysis of NORX: Investigating Differential and Rotational Properties Jean-Philippe Aumasson1 , Philipp Jovanovic2 , and Samuel Neves3 1  Kudelski Security, Switzerland

                Analysis of NORX: Investigating Differential and Rotational Properties Jean-Philippe Aumasson1 , Philipp Jovanovic2 , and Samuel Neves3 1 Kudelski Security, Switzerland

                Add to Reading List

                Source URL: eprint.iacr.org

                - Date: 2014-10-02 11:08:52