Suchergebnisse - "Formal methods and theory of security"
-
1
Autoren:
Weitere Verfasser:
Schlagwörter: Theory of computation Keywords and phrases Cryptography, Sequent Calculus Digital Object Identifier 10.4230/LIPIcs.CSL.2025.24, Theory of computation Keywords and phrases Cryptography Modal Logic Sequent Calculus Digital Object Identifier 10.4230/LIPIcs.CSL.2025.24, Theory of computation → Proof theory, Sequent Calculus, 2012 ACM Subject Classification Security and privacy → Formal methods and theory of security, Modal Logic, Cryptography, Security and privacy → Formal methods and theory of security, Theory of computation → Modal and temporal logics, [INFO] Computer Science [cs], ddc:004
Dateibeschreibung: application/pdf
-
2
Autoren: et al.
Weitere Verfasser: et al.
Quelle: Haselwarter, P G, Rivas, E, Van Muylder, A, Winterhalter, T, Abate, C, Sidorenco, N, Hriţcu, C, Maillard, K & Spitters, B 2023, 'SSProve : A Foundational Framework for Modular Cryptographic Proofs in Coq', ACM Transactions on Programming Languages and Systems, vol. 45, no. 3, 15, pp. 61. https://doi.org/10.1145/3594735
ACM Transactions on Programming Languages and Systems (TOPLAS)Schlagwörter: Technology, Pre-and post-conditions, Invariants, modular proofs, 4612 Software engineering, 4606 Distributed computing and systems software, [INFO] Computer Science [cs], High-assurance cryptography, Security and privacy, Formal methods and theory of security, state-separating proofs, high-assurance cryptography, Programming logic, [INFO]Computer Science [cs], formal verification, probabilistic relational program logic, machine-checked proofs, SECURITY, Science & Technology, 0803 Computer Software, Software Engineering, Computer Science, Software Engineering, ENCRYPTION, game-based proofs, 0806 Information Systems, Program verification, Computer Science, Categorical semantics, Cryptography, Logic and verification, Probabilistic computation
Dateibeschreibung: application/pdf
-
3
Autoren: et al.
Weitere Verfasser: et al.
Quelle: ARES 2024: The 19th International Conference on Availability, Reliability and Security ; The 19th International Conference on Availability, Reliability and Security (ARES 2024) ; https://hal.science/hal-04695972 ; The 19th International Conference on Availability, Reliability and Security (ARES 2024), Jul 2024, Vienna Austria, France. pp.1-10, ⟨10.1145/3664476.3664506⟩
Schlagwörter: Security and privacy, Formal methods and theory of security, Network security, Software and application security, Logic and verification, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
Geographisches Schlagwort: Vienna Austria, France
-
4
Autoren: et al.
Quelle: ACM Computing Surveys. Dec2025, Vol. 57 Issue 12, p1-34. 34p.
-
5
Autoren: et al.
Weitere Verfasser: et al.
Quelle: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. :462-476
Schlagwörter: Formal methods and theory of security, 0202 electrical engineering, electronic engineering, information engineering, Logic and verification, 02 engineering and technology, Security and privacy, [INFO.INFO-PL] Computer Science [cs]/Programming Languages [cs.PL], [INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]
-
6
Autoren: Biggio, Battista
Weitere Verfasser: Biggio, Battista
Schlagwörter: Computing methodologie, Machine learning, Security and privacy, Formal methods and theory of security, Systems security
Relation: info:eu-repo/semantics/altIdentifier/wos/WOS:001367965000020; volume:67; issue:11; firstpage:103; lastpage:103; numberofpages:1; journal:COMMUNICATIONS OF THE ACM; https://hdl.handle.net/11584/426363
-
7
Autoren: et al.
Weitere Verfasser: et al.
Schlagwörter: Symbolic Execution, Software and its engineering → Software verification and validation, Runtime Modelling, Security and privacy → Formal methods and theory of security, Symbolic Summaries, ddc:004
Dateibeschreibung: application/pdf
-
8
Weitere Verfasser:
Schlagwörter: embedded systems, formal languages and automata theory, Formal methods and theory of security, Machine learning, Modeling and simulation, Semantics and reasoning, software and hardware verification, specification and verification techniques, static and dynamic program analysis, Symbolic and algebraic manipulation, system construction and transformation techniques, Computer science, Coding theory and cryptology, Algorithms and data structures, Computer networking and communications, Software Engineering, Artificial intelligence
Dateibeschreibung: application/pdf
Relation: Lecture Notes in Computer Science
Zugangs-URL: https://library.oapen.org/handle/20.500.12657/54031
-
9
Autoren: et al.
Weitere Verfasser: et al.
Quelle: The 37th ACM/SIGAPP Symposium on Applied Computing(SAC ') ; SAC '22: Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing ; https://hal.science/hal-03992692 ; SAC '22: Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing, Apr 2022, Virtual Event, France. pp.316-325, ⟨10.1145/3477314.3507309⟩
Schlagwörter: Security and privacy, Formal methods and theory of security, Software and its engineering, Software creation and management, Software verification and validation, Formal software verification, Formal methods, [INFO]Computer Science [cs]
Geographisches Schlagwort: Virtual Event, France
-
10
Autoren: et al.
Weitere Verfasser: et al.
Quelle: MTD'22: Proceedings of the 9th ACM Workshop on Moving Target Defense ; https://hal.science/hal-04336316 ; MTD'22: Proceedings of the 9th ACM Workshop on Moving Target Defense, Nov 2022, Los Angeles CA USA, United States. pp.55-65, ⟨10.1145/3560828.3564009⟩
Schlagwörter: Security and privacy, Formal methods and theory of security, Systems security, Theory of computation, Formal languages and automata theory, Automata extensions, [INFO]Computer Science [cs]
Geographisches Schlagwort: Los Angeles CA USA, United States
Relation: info:eu-repo/semantics/altIdentifier/arxiv/2206.14076; ARXIV: 2206.14076
-
11
Autoren: et al.
Weitere Verfasser: et al.
Quelle: ISSN: 2168-7161 ; IEEE Transactions on Cloud Computing ; https://hal.science/hal-01991145 ; IEEE Transactions on Cloud Computing, 2021, 9 (1), pp.102-117. ⟨10.1109/TCC.2018.2865343⟩.
Schlagwörter: Proofs for data possession, Secure proof aggregation, Cooperative set homomorphic proofs, Information storage systems, Cloud based storage, Information retrieval, Formal methods and theory of security, Formal security models, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]
-
12
Weitere Verfasser:
Schlagwörter: formal languages and automata theory, Formal methods and theory of security, Machine learning, Modeling and simulation, Semantics and reasoning, signal processing, software and hardware verification, specification and verification techniques, Symbolic and algebraic manipulation, system construction and transformation techniques
Dateibeschreibung: application/pdf
Relation: Lecture Notes in Computer Science; ONIX_20220413_9783030995249_25; OCN: 1308973745
-
13
Autoren: et al.
Quelle: West Point Research Papers
Schlagwörter: security, privacy, systems security, formal methods and theory of security, distributed systems security, vulnerability, penetration testing, Cyber Research Center, Electrical Engineering and Computer Science, Information Security
-
14
Autoren:
Quelle: Australasian Journal of Information Systems; Vol. 21 (2017) ; 1326-2238
Schlagwörter: Information security strategy, organisational strategy, security quality, strategic information systems, business management, Security and privacy, Formal methods and theory of security, Formal security models
Dateibeschreibung: application/pdf
Relation: https://ajis.aaisnet.org/index.php/ajis/article/view/1427/771; https://ajis.aaisnet.org/index.php/ajis/article/view/1427
Verfügbarkeit: https://ajis.aaisnet.org/index.php/ajis/article/view/1427
-
15
Autoren: et al.
Quelle: ACM Transactions on Internet Technology; Nov2025, Vol. 25 Issue 4, p1-20, 20p
Schlagwörter: ACCESS control, SEMANTICS
-
16
Autoren: et al.
Quelle: ACM Computing Surveys; Aug2025, Vol. 57 Issue 8, p1-36, 36p
Schlagwörter: TAXONOMY, EVALUATION methodology, CYBERTERRORISM
-
17
Autoren:
Quelle: Digital Threats: Research & Practice; Jun2025, Vol. 6 Issue 2, p1-29, 29p
-
18
-
19
Autoren:
Quelle: ACM Computing Surveys; May2024, Vol. 56 Issue 5, p1-40, 40p
-
20
Privacy, Security, and Legal Issues in the Health Cloud: Structured Review for Taxonomy Development.
Autoren: Zandesh, Zahra
Quelle: JMIR Formative Research; 2024, Vol. 8, p1-20, 20p
Nájsť tento článok vo Web of Science
Full Text Finder