Sciweavers

5255 search results - page 159 / 1051
» Formal Methods for Privacy
Sort
View
128
Voted
PROVSEC
2009
Springer
15 years 10 months ago
Anonymous Signatures Revisited
Abstract. We revisit the notion of the anonymous signature, first formalized by Yang, Wong, Deng and Wang [12], and then further developed by Fischlin [6] and Zhang and Imai [13]. ...
Vishal Saraswat, Aaram Yun
ESORICS
2004
Springer
15 years 9 months ago
A Vector Model of Trust for Developing Trustworthy Systems
All security services rely to a great extent on some notion of trust. However, even today, there is no accepted formalism or technique for the specification of trust and for reaso...
Indrajit Ray, Sudip Chakraborty
115
Voted
IFM
1999
Springer
15 years 7 months ago
Modelling Discrete Behaviour in a Continuous-Time Formalism
Embedded real-time systems consist of a digital controller interacting with its physical environment. Developing such systems therefore involves specifying and reasoning about bot...
Colin J. Fidge
139
Voted
FMICS
2010
Springer
15 years 4 months ago
A Formal Model of Identity Mixer
Identity Mixer is an anonymous credential system developed at IBM that allows users for instance to prove that they are over 18 years old without revealing their name or birthdate....
Jan Camenisch, Sebastian Mödersheim, Dieter S...
144
Voted
CSE
2009
IEEE
15 years 10 months ago
Privacy-Preserving Multi-agent Constraint Satisfaction
—Constraint satisfaction has been a very successful paradigm for solving problems such as resource allocation and planning. Many of these problems pose themselves in a context in...
Thomas Léauté, Boi Faltings