Sciweavers

5255 search results - page 260 / 1051
» Formal Methods for Privacy
Sort
View
IVS
2006
127views more  IVS 2006»
15 years 4 months ago
Feature hiding in 3D human body scans
In this paper, we explore a privacy algorithm that detects human private parts in a 3D scan data set. The analogia graph is introduced to study the proportion of structures. The i...
Joseph Laws, Nathaniel Bauernfeind, Yang Cai 0002
OOPSLA
2007
Springer
15 years 10 months ago
A proposal for taming uncertainty in the collaborative conceptual model development process
There have been various proposals for the formalization of appropriate viewpoint-based frameworks. The model that we intend to devise attempts to provide a basis for conceptual mo...
Ebrahim Bagheri
IFIP11
2004
110views Business» more  IFIP11 2004»
15 years 5 months ago
A Security Model for Anonymous Credential Systems
This paper proposes a formal model of the Bellare-Rogaway type [1] that enables one to prove the security of an anonymous credential system in a complexity theoretic framework. Th...
Andreas Pashalidis, Chris J. Mitchell
OOPSLA
2000
Springer
15 years 8 months ago
A real world object modeling method for creating simulation environment of real-time systems
Most real-time embedded control software feature complex interactions with asynchronous inputs and environment objects, and a meaningful simulation of a real-time control software...
Ji Y. Lee, Hye J. Kim, Kyo Chul Kang
ACISP
2008
Springer
15 years 10 months ago
Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers
The elastic block cipher design employs the round function of a given, b-bit block cipher in a black box fashion, embedding it in a network structure to construct a family of ciphe...
Debra L. Cook, Moti Yung, Angelos D. Keromytis