Search

Your search keyword '"Security properties"' showing total 596 results

Search Constraints

Start Over You searched for: Descriptor "Security properties" Remove constraint Descriptor: "Security properties"
596 results on '"Security properties"'

Search Results

1. Security Challenges in Wireless Sensor Network: Current Status and Future Trends.

2. The cybersecurity of fairy tales.

3. Security Verification

5. An Automatically Verified Prototype of the Android Permissions System.

7. Formal Verification of Security Protocols: ProVerif and Extensions

8. Construction of Side Channel Attack Resistant S-Boxes Using Genetic Algorithms Based on Coordinate Functions

9. Construction of Side Channel Attack Resistant S-Boxes Using Genetic Algorithms Based on Coordinate Functions.

10. Physical layer security for NOMA: limitations, issues, and recommendations.

11. A Secure Anonymous Identity-Based Scheme in New Authentication Architecture for Mobile Edge Computing.

12. Verifiably Encrypted Group Signatures

13. Tightly‐secure two‐pass authenticated key exchange protocol using twin Diffie–Hellman problem.

15. Verifying Android’s Permission Model

17. Idea: Writing Secure C Programs with SecProve

18. Anonymity and rewards in peer rating systems1

19. CASTREAM: A New Stream Cipher Suitable for Both Hardware and Software

20. On Capabilities of Hash Domain Extenders to Preserve Enhanced Security Properties

21. Optimized Inlining of Runtime Monitors

22. An Efficient, Parameterized and Scalable S-box for Stream Ciphers

23. Security and Trust

24. Formalizing ROS2 security configuration with Alloy

27. Security Rules versus Security Properties

28. From a Generic Framework for Expressing Integrity Properties to a Dynamic mac Enforcement for Operating Systems

29. Security of a Key System of a Fiscal Feature.

30. A Higher Education.

31. SecCom: A Prototype for Integrating Security-Aware Components

32. Using Edit Automata for Rewriting-Based Security Enforcement

33. On the Security Properties and Attacks against Mobile Agent Graph Head Sealing (MAGHS)

34. An Automatically Verified Prototype of the Tokeneer ID Station Specification

35. Admissible Interference by Typing for Cryptographic Protocols

36. A Systematic Literature Review of Blockchain Technology: Security Properties, Applications and Challenges

37. On Fairness in Exchange Protocols

39. Pairing-Free and Secure Certificateless Signcryption Scheme.

41. Enclaves in the Clouds

42. The distributed ledgers ensuring privacy-preserving transactions

43. Automated Proof of Bell–LaPadula Security Properties

44. Modeling security properties of authentication of cryptographic protocols using spin formal verification

46. Lessons Learned: Analysis of PUF-based Authentication Protocols for IoT

47. SoK: Analysis of Software Supply Chain Security by Establishing Secure Design Properties

48. Formal Analysis of Security Models for Mobile Devices, Virtualization Platforms, and Domain Name Systems

49. On the Verification of Opacity in Web Services and Their Composition.

50. Leakage‐resilient message authentication code scheme based on hidden identity weak hash proof system.

Catalog

Books, media, physical & digital resources