Search

Your search keyword '"Security properties"' showing total 236 results

Search Constraints

Start Over You searched for: Descriptor "Security properties" Remove constraint Descriptor: "Security properties" Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years
236 results on '"Security properties"'

Search Results

1. Security Challenges in Wireless Sensor Network: Current Status and Future Trends.

2. The cybersecurity of fairy tales.

3. Security Verification

5. An Automatically Verified Prototype of the Android Permissions System.

7. Formal Verification of Security Protocols: ProVerif and Extensions

8. Construction of Side Channel Attack Resistant S-Boxes Using Genetic Algorithms Based on Coordinate Functions

9. Construction of Side Channel Attack Resistant S-Boxes Using Genetic Algorithms Based on Coordinate Functions.

10. Physical layer security for NOMA: limitations, issues, and recommendations.

11. A Secure Anonymous Identity-Based Scheme in New Authentication Architecture for Mobile Edge Computing.

12. Verifiably Encrypted Group Signatures

13. Tightly‐secure two‐pass authenticated key exchange protocol using twin Diffie–Hellman problem.

14. Anonymity and rewards in peer rating systems1

15. Formalizing ROS2 security configuration with Alloy

16. Security of a Key System of a Fiscal Feature.

17. A Higher Education.

18. An Automatically Verified Prototype of the Tokeneer ID Station Specification

19. A Systematic Literature Review of Blockchain Technology: Security Properties, Applications and Challenges

20. Pairing-Free and Secure Certificateless Signcryption Scheme.

21. Enclaves in the Clouds

22. The distributed ledgers ensuring privacy-preserving transactions

23. Automated Proof of Bell–LaPadula Security Properties

24. Modeling security properties of authentication of cryptographic protocols using spin formal verification

25. Lessons Learned: Analysis of PUF-based Authentication Protocols for IoT

26. SoK: Analysis of Software Supply Chain Security by Establishing Secure Design Properties

27. Formal Analysis of Security Models for Mobile Devices, Virtualization Platforms, and Domain Name Systems

28. On the Verification of Opacity in Web Services and Their Composition.

29. Leakage‐resilient message authentication code scheme based on hidden identity weak hash proof system.

30. Checking SysML Models Against Safety and Security Properties

31. Leader election protocol based on external RNG services

32. Function and safety evaluation of Staphylococcus epidermidis with high esterase activity isolated from strong flavor Daqu.

33. A systematic review on security metric in secure software development lifecycle

34. Formal Analysis of Android's Permission-Based Security Model.

35. Security assurance cases—state of the art of an emerging approach

36. Unpredictability properties in Algorand consensus protocol

37. BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures

38. On Security Properties of All-or-nothing Transforms

39. Secure LoRa Firmware Update with Adaptive Data Rate Techniques

40. P2T: Pay to Transport

41. Black-Box Testing for Security-Informed Safety of Automated Driving Systems

42. A Formal Approach to Secure Design of RESTful Web APIs Using SOFL

43. Constructions of Keyed Hash Functions

44. Formal Analysis of EDHOC Key Establishment for Constrained IoT Devices

45. Formal Analysis of Composable DeFi Protocols

46. Verification of security properties of the TLS 1.3 extensions

47. Privacy, Security and Trust in the Internet of Neurons

48. Balancing Security: A Moving Target

49. Probabilistic Annotations for Protocol Models

50. Développement rigoureux des architectures sécurisées dans les visions négative et positive : propriétés, modèles, analyse et outils support

Catalog

Books, media, physical & digital resources