Sciweavers

1061 search results - page 44 / 213
» A general definition of malware
Sort
View
ENTCS
2006
145views more  ENTCS 2006»
14 years 12 months ago
Real-or-random Key Secrecy of the Otway-Rees Protocol via a Symbolic Security Proof
We present the first cryptographically sound security proof of the well-known Otway-Rees protocol. More precisely, we show that the protocol is secure against arbitrary active att...
Michael Backes
JUCS
2008
166views more  JUCS 2008»
14 years 11 months ago
ASM Refinement Preserving Invariants
: This paper gives a definition of ASM refinement suitable for the verification that a protocol implements atomic transactions. We used this definition as the basis of the formal v...
Gerhard Schellhorn
ASIAN
2003
Springer
126views Algorithms» more  ASIAN 2003»
15 years 3 months ago
Information Flow Security for XML Transformations
Abstract. We provide a formal definition of information flows in XML transformations and, more generally, in the presence of type driven computations and describe a sound technique...
Véronique Benzaken, Marwan Burelle, Giusepp...
DAM
2008
78views more  DAM 2008»
14 years 12 months ago
On classes of minimal circular-imperfect graphs
Circular-perfect graphs form a natural superclass of perfect graphs: on the one hand due to their definition by means of a more general coloring concept, on the other hand as an i...
Arnaud Pêcher, Annegret Wagler
STOC
2009
ACM
145views Algorithms» more  STOC 2009»
16 years 14 days ago
Differential privacy and robust statistics
We show by means of several examples that robust statistical estimators present an excellent starting point for differentially private estimators. Our algorithms use a new paradig...
Cynthia Dwork, Jing Lei