Sciweavers

2137 search results - page 193 / 428
» Proving Abstract Non-interference
Sort
View
ISCAS
2005
IEEE
96views Hardware» more  ISCAS 2005»
15 years 9 months ago
Synthesis of MITE log-domain filters with unique operating points
Abstract— Practical log-domain filter circuits might have multiple operating points in regions in which the translinear element does not obey the exponential law. In this paper,...
Shyam Subramanian, David V. Anderson, Paul E. Hasl...
119
Voted
ASIACRYPT
2005
Springer
15 years 8 months ago
Privacy-Preserving Graph Algorithms in the Semi-honest Model
Abstract. We consider scenarios in which two parties, each in possession of a graph, wish to compute some algorithm on their joint graph in a privacy-preserving manner, that is, wi...
Justin Brickell, Vitaly Shmatikov
CCIA
2005
Springer
15 years 8 months ago
Mass Segmentation using a Pattern Matching Approach with a Mutual Information Based Metric
Abstract. As an ongoing effort to develop a computer aided system for the detection of masses on mammograms, we propose on this work a new model-based segmentation algorithm. The a...
Arnau Oliver, Jordi Freixenet, Joan Martí, ...
CCS
2005
ACM
15 years 8 months ago
Towards computationally sound symbolic analysis of key exchange protocols
d abstract) Prateek Gupta and Vitaly Shmatikov The University of Texas at Austin We present a cryptographically sound formal method for proving correctness of key exchange protoco...
Prateek Gupta, Vitaly Shmatikov
COCOON
2005
Springer
15 years 8 months ago
Interference in Cellular Networks: The Minimum Membership Set Cover Problem
Abstract. The infrastructure for mobile distributed tasks is often formed by cellular networks. One of the major issues in such networks is interference. In this paper we tackle in...
Fabian Kuhn, Pascal von Rickenbach, Roger Wattenho...