As cryptographic proofs have become essentially unverifiable, cryptographers have argued in favor of developing techniques that help tame the complexity of their proofs. Game-based …
When you think about how far and fast computer science has progressed in recent years, it's not hard to conclude that a seven-year old handbook may fall a little short of the kind of …
Deploying a new security protocol is expensive. This encourages system designers to look for ways of re-using existing infrastructure. When security protocols and components are re …
R Dennis, G Owenson, B Aziz - 2016 International Conference …, 2016 - ieeexplore.ieee.org
This paper presents a possible solution to a fundamental limitation facing all blockchain- based systems; scalability. We propose a temporal rolling blockchain which solves the …
This paper describes the verification of Secure Electronic Transaction (SET), an e-commerce protocol by VISA and MasterCard. The main tasks are to comprehend the written …
Recently, there has been an increased focus and a sense of urgency in developing standards for Power Grid systems centered on the need for interoperability. Given the threat …
The Dolev–Yao model is a simple and useful framework in which to analyze security protocols, but it assumes that the adversary is extremely limited. We show that it is possible …
KR Jayaram, AP Mathur - Department of Computer Science …, 2005 - cerias.purdue.edu
This report contains a survey of the state of the art in software engineering for secure software. Secure software is defined and techniques used in each phase of the software …
Abstract SET (Secure Electronic Transaction) is a suite of protocols proposed by a consortium of credit card companies and software corporations to secure e-commerce …