Sciweavers

1599 search results - page 37 / 320
» Program Analysis for Security and Privacy
Sort
View
CCS
2008
ACM
15 years 3 months ago
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Ralf Küsters, Tomasz Truderung
CCS
2006
ACM
15 years 5 months ago
Using model-based security analysis in component-oriented system development
We propose an integrated process for component-based system development and security risk analysis. The integrated process is evaluated in a case study involving an instant messag...
Gyrd Brændeland, Ketil Stølen
ACSAC
2001
IEEE
15 years 5 months ago
Privacy-Preserving Cooperative Statistical Analysis
The growth of the Internet opens up tremendous opportunities for cooperative computation, where the answer depends on the private inputs of separate entities. Sometimes these comp...
Wenliang Du, Mikhail J. Atallah
WPES
2004
ACM
15 years 7 months ago
A quantitative and qualitative ANALYSIS of blocking in association rule hiding
Emmanuel D. Pontikakis, Yannis Theodoridis, Achill...
MR
2010
219views Robotics» more  MR 2010»
14 years 8 months ago
Applications of TEM imaging, analysis and electron holography to III-nitride HEMT devices
David J. Smith, David A. Cullen, Lin Zhou, Martha ...