Sciweavers

17 search results - page 3 / 4
» Bounding Component Behavior via Protocols
Sort
View
111
Voted
ESORICS
2010
Springer
15 years 2 months ago
Secure Code Update for Embedded Devices via Proofs of Secure Erasure
Remote attestation is the process of verifying internal state of a remote embedded device. It is an important component of many security protocols and applications. Although previo...
Daniele Perito, Gene Tsudik
CORR
2010
Springer
63views Education» more  CORR 2010»
15 years 1 months ago
On Opinion Dynamics in Heterogeneous Networks
This paper studies the opinion dynamics model recently introduced by Hegselmann and Krause: (1) each agent in a group mantains a real number describing its opinion, (2) each agent ...
Anahita Mirtabatabaei, Francesco Bullo
IJFCS
2006
110views more  IJFCS 2006»
15 years 1 months ago
Sat-based Model Checking for Region Automata
For successful software verification, model checkers must be capable of handling a large number of program variables. Traditional, BDD-based model checking is deficient in this re...
Fang Yu, Bow-Yaw Wang
SODA
2012
ACM
177views Algorithms» more  SODA 2012»
13 years 4 months ago
Stochastic coalescence in logarithmic time
The following distributed coalescence protocol was introduced by Dahlia Malkhi in 2006 motivated by applications in social networking. Initially there are n agents wishing to coal...
Po-Shen Loh, Eyal Lubetzky
140
Voted
JOC
2011
157views more  JOC 2011»
14 years 8 months ago
Universally Composable Symbolic Security Analysis
In light of the growing complexity of cryptographic protocols and applications, it becomes highly desirable to mechanize — and eventually automate — the security analysis of p...
Ran Canetti, Jonathan Herzog