Sciweavers

577 search results - page 17 / 116
» Engineering Sufficiently Secure Computing
Sort
View
CORR
2008
Springer
102views Education» more  CORR 2008»
14 years 9 months ago
Game Theory with Costly Computation
We develop a general game-theoretic framework for reasoning about strategic agents performing possibly costly computation. In this framework, many traditional game-theoretic resul...
Joseph Y. Halpern, Rafael Pass
CCECE
2006
IEEE
15 years 3 months ago
Security Design Patterns: Survey and Evaluation
Security design patterns have been proposed recently as a tool for the improvement of software security during the architecture and design phases. Since the apperance of this rese...
Marc-André Laverdière, Azzam Mourad,...
CORR
2010
Springer
144views Education» more  CORR 2010»
14 years 9 months ago
Secure Transmission with Multiple Antennas II: The MIMOME Wiretap Channel
The capacity of the Gaussian wiretap channel model is analyzed when there are multiple antennas at the sender, intended receiver and eavesdropper. The associated channel matrices a...
Ashish Khisti, Gregory W. Wornell
IDTRUST
2010
ACM
15 years 4 months ago
Computational techniques for increasing PKI policy comprehension by human analysts
Natural-language policies found in X.509 PKI describe an organization’s stated policy as a set of requirements for trust. The widespread use of X.509 underscores the importance ...
Gabriel A. Weaver, Scott A. Rea, Sean W. Smith
VMCAI
2010
Springer
15 years 6 months ago
Automatic Abstraction for Congruences
c Abstraction for Congruences A Story of Beauty and the Beast Andy King and Harald S?ndergaard Portcullis Computer Security University of Melbourne g and Harald S?ndergaard Automat...
Andy King, Harald Søndergaard