Sciweavers

518 search results - page 28 / 104
» Abstract Interpretation-Based Protection
Sort
View
132
Voted
VIROLOGY
2010
179views more  VIROLOGY 2010»
15 years 9 days ago
Automatic binary deobfuscation
Abstract. This paper gives an overview of our research in the automation of the process of software protection analysis. We will focus more particularly on the problem of obfuscati...
Yoann Guillot, Alexandre Gazet
SP
2010
IEEE
210views Security Privacy» more  SP 2010»
15 years 5 months ago
Reconciling Belief and Vulnerability in Information Flow
Abstract—Belief and vulnerability have been proposed recently to quantify information flow in security systems. Both concepts stand as alternatives to the traditional approaches...
Sardaouna Hamadou, Vladimiro Sassone, Catuscia Pal...
ICC
2007
IEEE
112views Communications» more  ICC 2007»
15 years 5 months ago
Admission Control in Ethernet Passive Optical Networks (EPONs)
Abstract--Ethernet passive optical networks (EPONs) are designed to deliver services for numerous applications such as voice over Internet protocol, standard and high-definition vi...
Ahmad R. Dhaini, Chadi M. Assi, Martin Maier, Abda...
ASIACRYPT
2001
Springer
15 years 5 months ago
Self-Blindable Credential Certificates from the Weil Pairing
Abstract. We describe two simple, efficient and effective credential pseudonymous certificate systems, which also support anonymity without the need for a trusted third party. The ...
Eric R. Verheul
CIA
1997
Springer
15 years 5 months ago
Multi-Level Security in Multiagent Systems
Abstract. Whenever agents deal with con dential information, it is important that they comply with a principled security policy. We show how the database concept of multi-level sec...
Gerd Wagner