Sciweavers

1599 search results - page 305 / 320
» Program Analysis for Security and Privacy
Sort
View
ICALP
2005
Springer
15 years 5 months ago
Combining Intruder Theories
Abstract. Most of the decision procedures for symbolic analysis of protocols are limited to a fixed set of algebraic operators associated with a fixed intruder theory. Examples o...
Yannick Chevalier, Michaël Rusinowitch
IMA
2005
Springer
127views Cryptology» more  IMA 2005»
15 years 5 months ago
On the Automatic Construction of Indistinguishable Operations
Abstract. An increasingly important design constraint for software running on ubiquitous computing devices is security, particularly against physical methods such as side-channel a...
Manuel Barbosa, Dan Page
ATVA
2006
Springer
160views Hardware» more  ATVA 2006»
15 years 3 months ago
Monotonic Set-Extended Prefix Rewriting and Verification of Recursive Ping-Pong Protocols
Ping-pong protocols with recursive definitions of agents, but without any active intruder, are a Turing powerful model. We show that under the environment sensitive semantics (i.e....
Giorgio Delzanno, Javier Esparza, Jirí Srba
AUTOMATICA
2006
183views more  AUTOMATICA 2006»
14 years 11 months ago
Bank management via stochastic optimal control
This paper examines a problem related to the optimal risk management of banks in a stochastic dynamic setting. In particular, we minimize7 market and capital adequacy risk that in...
Janine Mukuddem-Petersen, Mark Adam Petersen
IJISEC
2008
119views more  IJISEC 2008»
14 years 11 months ago
Estimating the maximum information leakage
Preventing improper information leaks is a greatest challenge of the modern society. In this paper we present a technique for measuring the ability of several families of adversari...
Alessandro Aldini, Alessandra Di Pierro