Sciweavers

3624 search results - page 143 / 725
» Abstract Algebraic Logic
Sort
View
145
Voted
ESORICS
2004
Springer
15 years 10 months ago
An Algebra for Composing Enterprise Privacy Policies
Abstract. Enterprise privacy enforcement allows enterprises to internally enforce a privacy policy that the enterprise has decided to comply to. To facilitate the compliance with d...
Michael Backes, Markus Dürmuth, Rainer Steinw...
142
Voted
CRYPTO
2006
Springer
125views Cryptology» more  CRYPTO 2006»
15 years 8 months ago
On the Higher Order Nonlinearities of Algebraic Immune Functions
Abstract. One of the most basic requirements concerning Boolean functions used in cryptosystems is that they must have high algebraic degrees. This simple criterion is not always w...
Claude Carlet
CISC
2009
Springer
174views Cryptology» more  CISC 2009»
15 years 2 months ago
Algebraic Side-Channel Attacks
Abstract. In 2002, algebraic attacks using overdefined systems of equations have been proposed as a potentially very powerful cryptanalysis technique against block ciphers. However...
Mathieu Renauld, François-Xavier Standaert
COSIT
2009
Springer
133views GIS» more  COSIT 2009»
15 years 11 months ago
A Metric Conceptual Space Algebra
Abstract. The modeling of concepts from a cognitive perspective is important for designing spatial information systems that interoperate with human users. Concept representations t...
Benjamin Adams, Martin Raubal
143
Voted
BIRTHDAY
2005
Springer
15 years 10 months ago
Finite Equational Bases in Process Algebra: Results and Open Questions
Abstract. Van Glabbeek (1990) presented the linear time/branching time spectrum of behavioral equivalences for finitely branching, concrete, sequential processes. He studied these...
Luca Aceto, Wan Fokkink, Anna Ingólfsd&oacu...