Sciweavers

Share
1209 search results - page 1 / 242
» Compositional Methods for Information-Hiding
Sort
View
FOSSACS
2008
Springer
8 years 4 months ago
Compositional Methods for Information-Hiding
Protocols for information-hiding often use randomized primitives to obfuscate the link between the observables and the information to be protected. The degree of protection provide...
Christelle Braun, Konstantinos Chatzikokolakis, Ca...
SIGSOFT
2005
ACM
9 years 4 months ago
Information hiding interfaces for aspect-oriented design
The growing popularity of aspect-oriented languages, such as AspectJ, and of corresponding design approaches, makes it important to learn how best to modularize programs in which ...
Kevin J. Sullivan, William G. Griswold, Yuanyuan S...
TOPLAS
2002
98views more  TOPLAS 2002»
8 years 2 months ago
Data abstraction and information hiding
traction and information hiding K. RUSTAN M. LEINO and GREG NELSON Compaq Systems Research Center er describes an approach for verifying programs in the presence of data abstractio...
K. Rustan M. Leino, Greg Nelson
TACAS
2010
Springer
162views Algorithms» more  TACAS 2010»
8 years 10 months ago
Computing the Leakage of Information-Hiding Systems
We address the problem of computing the information leakage of a system in an ef´Čücient way. We propose two methods: one based on reducing the problem to reachability, and the oth...
Miguel E. Andrés, Catuscia Palamidessi, Pet...
ICDIM
2007
IEEE
8 years 9 months ago
Biorthogonal matrix dirty paper coding for information hiding in still images
In this paper, a new method of dirty paper code design is investigated, namely the biorthogonal matrix. The error probability is analysed for the code design. Since the code has t...
Xin Xu, Martin Tomlinson, Marcel Ambroze, Mohammed...
books