Sciweavers

SAGT
2015
Springer
24views Game Theory» more  SAGT 2015»
9 years 11 months ago
The Combinatorial World (of Auctions) According to GARP
Revealed preference techniques are used to test whether a data set is compatible with rational behaviour. They are also incorporated as constraints in mechanism design to encourage...
Shant Boodaghians, Adrian Vetta
CARDIS
2015
Springer
24views Hardware» more  CARDIS 2015»
9 years 11 months ago
Towards Fresh and Hybrid Re-Keying Schemes with Beyond Birthday Security
Fresh re-keying is a type of protocol which aims at splitting the task of protecting an encryption/authentication scheme against side-channel attacks in two parts. One part, a re-k...
Christoph Dobraunig, François Koeune, Stefa...
CARDIS
2015
Springer
25views Hardware» more  CARDIS 2015»
9 years 11 months ago
Comparing Approaches to Rank Estimation for Side-Channel Security Evaluations
Abstract. Rank estimation is an important tool for side-channel evaluations laboratories. It allows determining the remaining security after an attack has been performed, quantifi...
Romain Poussier, Vincent Grosso, François-X...
SAFECOMP
2015
Springer
9 years 11 months ago
Informing Assurance Case Review Through a Formal Interpretation of GSN Core Logic
Abstract. A formalization of a logical subset of Goal Structuring Notation (GSN) arguments is presented. The aim is to reveal the conditions which must be true in order to guarante...
Victor Bandur, John McDermid