1![Cryptographic Hardware (named Myst) that enables cryptographic devices to maintain their security properties in the from presence of malicious hardware components. UnUntrusted Components like prior mitigation efforts tha Cryptographic Hardware (named Myst) that enables cryptographic devices to maintain their security properties in the from presence of malicious hardware components. UnUntrusted Components like prior mitigation efforts tha](https://www.pdfsearch.io/img/2ca10fba8a001c9a9cdfbb283c381dff.jpg) | Add to Reading ListSource URL: backdoortolerance.orgLanguage: English - Date: 2018-03-13 07:04:44
|
---|
2![Some issues in verifying e-voting systems Mark D. Ryan ● Present-day e-voting offers few security properties [KohnoStubblefieldRubinWallach2004] compared to what is desirable: Some issues in verifying e-voting systems Mark D. Ryan ● Present-day e-voting offers few security properties [KohnoStubblefieldRubinWallach2004] compared to what is desirable:](https://www.pdfsearch.io/img/d94a1a4d203e93b3e8333d8633fe1ca8.jpg) | Add to Reading ListSource URL: www.cs.bham.ac.ukLanguage: English - Date: 2010-03-26 10:57:07
|
---|
3![Model checking security properties of control flow graphs Fr´ed´eric Besson Thomas Jensen IRISA/CNRS Campus de Beaulieu FRennes Cedex Model checking security properties of control flow graphs Fr´ed´eric Besson Thomas Jensen IRISA/CNRS Campus de Beaulieu FRennes Cedex](https://www.pdfsearch.io/img/321e7df1ecb526d359708aa9e2495116.jpg) | Add to Reading ListSource URL: people.rennes.inria.frLanguage: English - Date: 2014-09-03 04:27:28
|
---|
4![Formal Reasoning about Physical Properties of Security Protocols DAVID BASIN, SRDJAN CAPKUN, PATRICK SCHALLER, and BENEDIKT SCHMIDT ETH Zurich, Switzerland Traditional security protocols are mainly concerned with authen Formal Reasoning about Physical Properties of Security Protocols DAVID BASIN, SRDJAN CAPKUN, PATRICK SCHALLER, and BENEDIKT SCHMIDT ETH Zurich, Switzerland Traditional security protocols are mainly concerned with authen](https://www.pdfsearch.io/img/ed7e8fdb4a5ba6b3cfb758b5a9b188e2.jpg) | Add to Reading ListSource URL: www.inf.ethz.chLanguage: English - Date: 2011-09-22 05:55:49
|
---|
5![Breakout group: How can we design systems with known security properties? NSF/IARPA/NSA Workshop on the Science of Security November 17-18, 2008 Breakout group: How can we design systems with known security properties? NSF/IARPA/NSA Workshop on the Science of Security November 17-18, 2008](https://www.pdfsearch.io/img/99a37f5d8b9c803940acb9196fdcd34a.jpg) | Add to Reading ListSource URL: sos.cs.virginia.eduLanguage: English - Date: 2008-11-20 14:47:21
|
---|
6![Technical Report no. 2004–08 Formalisation and Verification of JAVA CARD Security Properties in Dynamic Logic Technical Report no. 2004–08 Formalisation and Verification of JAVA CARD Security Properties in Dynamic Logic](https://www.pdfsearch.io/img/e901230ec9ce410fff7ff4bb4b14806a.jpg) | Add to Reading ListSource URL: ceres.hh.seLanguage: English - Date: 2015-05-16 14:10:32
|
---|
7![DEEPSEC: Deciding Equivalence Properties in Security Protocols Theory and Practice Vincent Cheval, Steve Kremer, Itsaka Rakotonirina Inria & LORIA Abstract—Automated verification has become an essential part DEEPSEC: Deciding Equivalence Properties in Security Protocols Theory and Practice Vincent Cheval, Steve Kremer, Itsaka Rakotonirina Inria & LORIA Abstract—Automated verification has become an essential part](https://www.pdfsearch.io/img/b3585e3619cdd7abfad99e07b9f2039e.jpg) | Add to Reading ListSource URL: anr17-tecap.gforge.inria.frLanguage: English - Date: 2018-02-12 05:14:30
|
---|
8![Arthur Gervais I am motivated by revolutionizing how society trades and interacts. Bitcoin and the security properties of its blockchain provide technical means to catalyze societal evolution. My resear Arthur Gervais I am motivated by revolutionizing how society trades and interacts. Bitcoin and the security properties of its blockchain provide technical means to catalyze societal evolution. My resear](https://www.pdfsearch.io/img/111f10f34d516612673df2dc40af93c4.jpg) | Add to Reading ListSource URL: www.arthurgervais.comLanguage: English - Date: 2016-11-14 10:46:36
|
---|
9![Abstract of “Static Analyses of Cryptographic Protocols” by Jay McCarthy, Ph.D., Brown University, May 2009 Most protocol analyses only address security properties. However, other properties are important and can inc Abstract of “Static Analyses of Cryptographic Protocols” by Jay McCarthy, Ph.D., Brown University, May 2009 Most protocol analyses only address security properties. However, other properties are important and can inc](https://www.pdfsearch.io/img/bfeee45da2b4ade9a0af49c1cca688ea.jpg) | Add to Reading ListSource URL: jeapostrophe.github.io- Date: 2018-04-03 12:30:31
|
---|
10![Analysis of NORX: Investigating Differential and Rotational Properties Jean-Philippe Aumasson1 , Philipp Jovanovic2 , and Samuel Neves3 1 Kudelski Security, Switzerland Analysis of NORX: Investigating Differential and Rotational Properties Jean-Philippe Aumasson1 , Philipp Jovanovic2 , and Samuel Neves3 1 Kudelski Security, Switzerland](https://www.pdfsearch.io/img/259291cb81b8a0fefebc2c3f2b6f4a81.jpg) | Add to Reading ListSource URL: eprint.iacr.org- Date: 2014-10-02 11:08:52
|
---|