Security Properties

Results: 169



#Item
1Cryptography / Computer security / Computer hardware / Cyberwarfare / ISO standards / Hardware Trojan / Hardware security module / Secure cryptoprocessor / Hardware security / Trusted Platform Module / Smart card

Cryptographic Hardware (named Myst) that enables cryptographic devices to maintain their security properties in the from presence of malicious hardware components. UnUntrusted Components like prior mitigation efforts tha

Add to Reading List

Source URL: backdoortolerance.org

Language: English - Date: 2018-03-13 07:04:44
2

Some issues in verifying e-voting systems Mark D. Ryan ● Present-day e-voting offers few security properties [KohnoStubblefieldRubinWallach2004] compared to what is desirable:

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2010-03-26 10:57:07
    3

    Model checking security properties of control flow graphs Fr´ed´eric Besson Thomas Jensen IRISA/CNRS Campus de Beaulieu FRennes Cedex

    Add to Reading List

    Source URL: people.rennes.inria.fr

    Language: English - Date: 2014-09-03 04:27:28
      4

      Formal Reasoning about Physical Properties of Security Protocols DAVID BASIN, SRDJAN CAPKUN, PATRICK SCHALLER, and BENEDIKT SCHMIDT ETH Zurich, Switzerland Traditional security protocols are mainly concerned with authen

      Add to Reading List

      Source URL: www.inf.ethz.ch

      Language: English - Date: 2011-09-22 05:55:49
        5

        Breakout group: How can we design systems with known security properties? NSF/IARPA/NSA Workshop on the Science of Security November 17-18, 2008

        Add to Reading List

        Source URL: sos.cs.virginia.edu

        Language: English - Date: 2008-11-20 14:47:21
          6

          Technical Report no. 2004–08 Formalisation and Verification of JAVA CARD Security Properties in Dynamic Logic

          Add to Reading List

          Source URL: ceres.hh.se

          Language: English - Date: 2015-05-16 14:10:32
            7

            DEEPSEC: Deciding Equivalence Properties in Security Protocols Theory and Practice Vincent Cheval, Steve Kremer, Itsaka Rakotonirina Inria & LORIA Abstract—Automated verification has become an essential part

            Add to Reading List

            Source URL: anr17-tecap.gforge.inria.fr

            Language: English - Date: 2018-02-12 05:14:30
              8Cryptocurrencies / Bitcoin / Blockchains / Alternative currencies / Computing / Concurrent computing / Distributed computing / ETH Zurich / Ethereum / RootStock

              Arthur Gervais I am motivated by revolutionizing how society trades and interacts. Bitcoin and the security properties of its blockchain provide technical means to catalyze societal evolution. My resear

              Add to Reading List

              Source URL: www.arthurgervais.com

              Language: English - Date: 2016-11-14 10:46:36
              9

              Abstract of “Static Analyses of Cryptographic Protocols” by Jay McCarthy, Ph.D., Brown University, May 2009 Most protocol analyses only address security properties. However, other properties are important and can inc

              Add to Reading List

              Source URL: jeapostrophe.github.io

              - Date: 2018-04-03 12:30:31
                10

                Analysis of NORX: Investigating Differential and Rotational Properties Jean-Philippe Aumasson1 , Philipp Jovanovic2 , and Samuel Neves3 1 Kudelski Security, Switzerland

                Add to Reading List

                Source URL: eprint.iacr.org

                - Date: 2014-10-02 11:08:52
                  UPDATE