Sciweavers

67 search results - page 2 / 14
» A Quantitative Approach to Reductions in Secure Computation
Sort
View
IEEEARES
2006
IEEE
13 years 11 months ago
Defense trees for economic evaluation of security investments
In this paper we present a mixed qualitative and quantitative approach for evaluation of Information Technology (IT) security investments. For this purpose, we model security scen...
Stefano Bistarelli, Fabio Fioravanti, Pamela Peret...
CSFW
2010
IEEE
13 years 9 months ago
Approximation and Randomization for Quantitative Information-Flow Analysis
—Quantitative information-flow analysis (QIF) is an emerging technique for establishing information-theoretic confidentiality properties. Automation of QIF is an important step...
Boris Köpf, Andrey Rybalchenko
EUROCRYPT
2007
Springer
13 years 9 months ago
An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries
We show an efficient secure two-party protocol, based on Yao's construction, which provides security against malicious adversaries. Yao's original protocol is only secur...
Yehuda Lindell, Benny Pinkas
ENTCS
2010
118views more  ENTCS 2010»
13 years 2 months ago
Fragments-based Model Reduction: Some Case Studies
Molecular biological models usually suffer from a dramatic combinatorial blow up. Indeed, proteins form complexes and can modify each others, which leads to the formation of a hug...
Jérôme Feret
CN
2007
80views more  CN 2007»
13 years 5 months ago
A queueing analysis for the denial of service (DoS) attacks in computer networks
In most network security analysis, researchers mainly focus on qualitative studies on security schemes and possible attacks, and there are few papers on quantitative analysis in t...
Yang Wang, Chuang Lin, Quan-Lin Li, Yuguang Fang