Sciweavers

1599 search results - page 37 / 320
» Probabilistic Analysis of Anonymity
Sort
View
DAC
2001
ACM
16 years 24 days ago
Fast Statistical Timing Analysis By Probabilistic Event Propagation
Jing-Jia Liou, Kwang-Ting Cheng, Sandip Kundu, Ang...
CADE
2010
Springer
15 years 29 days ago
Automating Security Analysis: Symbolic Equivalence of Constraint Systems
We consider security properties of cryptographic protocols, that are either trace properties (such as confidentiality or authenticity) or equivalence properties (such as anonymity ...
Vincent Cheval, Hubert Comon-Lundh, Stéphan...
ESORICS
2009
Springer
15 years 6 months ago
Privacy Preserving Publication of Moving Object Data
The increasing availability of space-time trajectories left by location-aware devices is expected to enable novel classes of applications where the discovery of consumable, concise...
Francesco Bonchi
WPES
2006
ACM
15 years 5 months ago
Nonesuch: a mix network with sender unobservability
Oblivious submission to anonymity systems is a process by which a message may be submitted in such a way that neither the anonymity network nor a global passive adversary may dete...
Thomas S. Heydt-Benjamin, Andrei Serjantov, Beness...
ETFA
2008
IEEE
15 years 6 months ago
Reactivity analysis of different Networked Automation System architectures
The reactivity of Networked Automation Systems (NAS) has direct influence on safety and quality aspects. It can be determined by a response time analysis, which itself can be calc...
Jürgen Greifeneder, Georg Frey