Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Amerson Lin"'
Autor:
Adam Batkin, Stan Zdonik, Michael Stonebraker, Amerson Lin, Xuedong Chen, Miguel Ferreira, Samuel Madden, Mitch Cherniack, Patrick O'Neil, Elizabeth O'Neil, Alexander Rasin, Daniel J. Abadi, Nga Tran, Edmond Lau
Publikováno v:
Making Databases Work
This paper presents the design of a read-optimized relational DBMS that contrasts sharply with most current systems, which are write-optimized. Among the many differences in its design are: storage of data by column rather than by row, careful coding
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ecc8c62fb451ba57edbff20c3339b126
https://doi.org/10.1145/3226595.3226638
https://doi.org/10.1145/3226595.3226638
Publikováno v:
Security Protocols ISBN: 9783642177729
Security Protocols Workshop
Security Protocols Workshop
The automated and formal analysis of cryptographic primitives, security protocols and Application Programming Interfaces (APIs) up to date has been focused on discovering attacks that completely break the security of a system. However, there are atta
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5873f64a96e37a914e679c354f8f844b
https://doi.org/10.1007/978-3-642-17773-6_4
https://doi.org/10.1007/978-3-642-17773-6_4
Publikováno v:
Security Protocols ISBN: 9783642177729
Security Protocols Workshop
Security Protocols Workshop
We present new attacks against the EMV financial transaction security system (known in Europe as “Chip and PIN”), specifically on the back-end API support for sending secure messages to EMV smartcards.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::bc33e9f86b5ff62900d66f2facdf0f3a
https://doi.org/10.1007/978-3-642-17773-6_17
https://doi.org/10.1007/978-3-642-17773-6_17
Autor:
Amerson Lin
Publikováno v:
Security Protocols ISBN: 9783642177729
Security Protocols Workshop
Security Protocols Workshop
The reason we went into this research, was that we found that partial attacks were extremely hard to model in terms of a language that could be used by an automated tool. Now there are three reasons why this is so. The first is that it is hard to ide
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3837cfc7dd40bec42d2cd2c5de49356f
https://doi.org/10.1007/978-3-642-17773-6_5
https://doi.org/10.1007/978-3-642-17773-6_5
Autor:
Jonathan Herzog, Ronald L. Rivest, Ben Adida, Mike Bond, Amerson Lin, Jolyon Clulow, Paul Youn, Ross Anderson
Publikováno v:
Security Protocols ISBN: 9783642177729
So it’s a fairly provocative title, how did we get to that? Well automated tools have been successfully applied to modelling security protocols and finding attacks, and some good examples here are Gavin Lowe’s work, using FDR to model the Needham
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::0bb2aa9bfd65f369266684bbd34e97a3
https://doi.org/10.1007/978-3-642-17773-6_21
https://doi.org/10.1007/978-3-642-17773-6_21
Autor:
Paul Youn, Amerson Lin, Jolyon Clulow, Ross Anderson, Mike Bond, Ben Adida, Ronald L. Rivest, Jonathan Herzog
Publikováno v:
Security Protocols ISBN: 9783642177729
So it’s a fairly provocative title, how did we get to that? Well automated tools have been successfully applied to modelling security protocols and finding attacks, and some good examples here are Gavin Lowe’s work, using FDR to model the Needham
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f14bf5b3249e965b22550c8eacf13ea1
https://doi.org/10.1007/978-3-642-17773-6_22
https://doi.org/10.1007/978-3-642-17773-6_22
Autor:
Ronald L. Rivest, Steven J. Murdoch, Jolyon Clulow, Ben Adida, Ross Anderson, Amerson Lin, Mike Bond
Publikováno v:
Security Protocols ISBN: 9783642049033
Security Protocols Workshop
Security Protocols Workshop
This paper surveys existing and new security issues affecting the EMV electronic payments protocol. We first introduce a new price/effort point for the cost of deploying eavesdropping and relay attacks --- a microcontroller-based interceptor costing
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d3f326975452bbf79a906aea028e3ec1
https://doi.org/10.1007/978-3-642-04904-0_7
https://doi.org/10.1007/978-3-642-04904-0_7
Autor:
Paul Youn, Ben Adida, Mike Bond, Jolyon Clulow, Jonathan Herzog, Amerson Lin, Ronald L. Rivest, Ross Anderson
We present the first methodology for analysis and automated detection of attacks on security application programming interfaces (security APIs) – the interfaces to hardware cryptographic services used by developers of critical security systems, suc
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b91f5389fe0396b65a049a115c176501