Vyzkoušejte nový nástroj s podporou AI
Summon Research Assistant
BETA
Dispelling myths on superposition attacks: formal security model and attack analyses
Music, Luka, Chevalier, Céline, Kashefi, Elham
Published in Designs, codes, and cryptography (01.04.2022)
Published in Designs, codes, and cryptography (01.04.2022)
Get full text
Journal Article
Modeling and Verifying Physical Properties of Security Protocols for Wireless Networks
Schaller, P., Schmidt, B., Basin, D., Capkun, S.
Published in 2009 22nd IEEE Computer Security Foundations Symposium (01.07.2009)
Published in 2009 22nd IEEE Computer Security Foundations Symposium (01.07.2009)
Get full text
Conference Proceeding
Bi-objective Optimization in Role Mining
Crampton, Jason, Eiben, Eduard, Gutin, Gregory, Karapetyan, Daniel, Majumdar, Diptapriyo
Published in ACM transactions on privacy and security (09.11.2024)
Published in ACM transactions on privacy and security (09.11.2024)
Get full text
Journal Article
Verified formal security models for multiapplicative smart cards 1
Schellhorn, Gerhard, Reif, Wolfgang, Schairer, Axel, Karger, Paul, Austel, Vernon, Toll, David
Published in Journal of computer security (01.10.2002)
Published in Journal of computer security (01.10.2002)
Get full text
Journal Article
Delegating a Pairing Can Be Both Secure and Efficient
Canard, Sébastien, Devigne, Julien, Sanders, Olivier
Published in Applied Cryptography and Network Security (2014)
Published in Applied Cryptography and Network Security (2014)
Get full text
Book Chapter
Tool for I&C system security policy verification
Promyslov, Vitaly G.
Published in 2015 9th International Conference on Application of Information and Communication Technologies (AICT) (01.10.2015)
Published in 2015 9th International Conference on Application of Information and Communication Technologies (AICT) (01.10.2015)
Get full text
Conference Proceeding