Results 161 to 170 of about 467 (189)
Some of the next articles are maybe not open access.
Fast automatic synthesis of security protocols using backward search
Proceedings of the 2003 ACM workshop on Formal methods in security engineering, 2003An automatic security protocol generator is proposed that used logic-based synthesis rules to guide it in a backward search for suitable protocols from protocol goals. The approach taken is unlike existing automatic protocol generators which typically carry out a forward search for candidate protocols from the protocol assumptions.
Hongbin Zhou, Simon N. Foley
openaire +1 more source
Practical Backward-Secure Searchable Encryption from Symmetric Puncturable Encryption
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018Symmetric Searchable Encryption (SSE) has received wide attention due to its practical application in searching on encrypted data. Beyond search, data addition and deletion are also supported in dynamic SSE schemes. Unfortunately, these update operations leak some information of updated data.
Shi-Feng Sun +6 more
openaire +1 more source
Bestie: Very Practical Searchable Encryption with Forward and Backward Security
2021Dynamic searchable symmetric-key encryption (DSSE) is a promising crypto-tool that enables secure keyword searching over dynamically added or deleted ciphertexts. Currently, many works on DSSE devote their efforts to obtaining forward and backward security and practical performance.
Tianyang Chen +5 more
openaire +1 more source
Securing mineral supply: backwards vertical integration for technology companies
2023The demand for minerals has increased with the growing production of standard technologies, such as EV car batteries, wind turbines, and solar panels. However, major mining companies need help to satisfy the demand at the current rate, leading to inconsistent and expensive supply chains and environmental and geopolitical concerns.
openaire +1 more source
Backward Cloud Based Elimination of Uncertainty in Security Assessment Parameters
2010 International Conference on Electrical and Control Engineering, 2010The uncertainty in selection of security assessment parameters heavily affects the accuracy and credibility of the assessment results. The method of selection based on opinion of group experts lacks the ability of describing the uncertainty in the selection procedure, and the method based on interval matrixes does not measure the degree of credibility ...
Bing Xia, Xiangdong Li, Qiusheng Zheng
openaire +1 more source
On backward-style verification for timed anonymity of security protocols
2016 IEEE 5th Global Conference on Consumer Electronics, 2016Trace anonymity is an extension of the formulation of anonymity by Schneider and Sidiropoulos. To prove the trace anonymity of infinite-state or unbounded systems, we have introduced proof techniques in which we find a binary relation called an anonymous simulation.
Yoshinobu Kawabe, Nobuhiro Ito
openaire +1 more source
Towards Efficient and Strong Backward Private Searchable Encryption with Secure Enclaves
2021Dynamic searchable symmetric encryption (DSSE) can enable a cloud server to search and update over the encrypted data. Recently, forward and backward privacy in DSSE receive wide attention due to the rise in a number of emerging attacks exploiting the leakage in data update operations.
Viet Vo +4 more
openaire +1 more source
Economic Backwardness in Security Perspective [PDF]
Modern political economies are distinguished from each other by the institutions that mediate actors’ interactions, falling somewhere along a spectrum between pure market and non-market mechanisms. But how did these institutions originally emerge?
openaire
Food and Nutrition Security: Lessons From 'African Backwardness'
This research work explores food and nutrition security through the lens of Bemba indigenous knowledge and lived experiences in Northern Zambia. The research investigates how pre-colonial Bemba communities achieved nutrition security using local crops, traditional culinary practices, and food preservation methods.Hildah Mutale +2 more
openaire +1 more source
Symbolic backward reachability with effectively propositional logic
Formal Methods in System Design, 2012zbMATH Open Web Interface contents unavailable due to conflicting licenses.
openaire +4 more sources

