Sciweavers

1914 search results - page 383 / 383
» Verification by Abstract Interpretation
Sort
View
CRYPTO
2011
Springer
245views Cryptology» more  CRYPTO 2011»
12 years 4 months ago
Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages
We present a somewhat homomorphic encryption scheme that is both very simple to describe and analyze, and whose security (quantumly) reduces to the worst-case hardness of problems ...
Zvika Brakerski, Vinod Vaikuntanathan
IACR
2011
132views more  IACR 2011»
12 years 4 months ago
Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience
Abstract. Tampering attacks are cryptanalytic attacks on the implementation of cryptographic algorithms (e.g., smart cards), where an adversary introduces faults with the hope that...
Sebastian Faust, Krzysztof Pietrzak, Daniele Ventu...
ISSTA
2012
ACM
11 years 7 months ago
Static memory leak detection using full-sparse value-flow analysis
We introduce a static detector, Saber, for detecting memory leaks in C programs. Leveraging recent advances on sparse pointer analysis, Saber is the first to use a full-sparse va...
Yulei Sui, Ding Ye, Jingling Xue
EPK
2007
131views Management» more  EPK 2007»
13 years 6 months ago
Forderungen an hierarchische EPK-Schemata
Abstract: Ereignisgesteuerte Prozessketten (EPK) sind eine Notation zur Modellierung von Geschäftsprozessen. Komplexe Geschäftsprozesse werden üblicherweise nicht als eine einzi...
Volker Gruhn, Ralf Laue