Sciweavers

10666 search results - page 1972 / 2134
» Quantum programming languages
Sort
View
134
Voted
ICAPR
2005
Springer
15 years 9 months ago
Applying Software Analysis Technology to Lightweight Semantic Markup of Document Text
Abstract. Software analysis techniques, and in particular software “design recovery”, have been highly successful at both technical and businesslevel semantic markup of large s...
Nadzeya Kiyavitskaya, Nicola Zeni, James R. Cordy,...
110
Voted
IFIP
2005
Springer
15 years 9 months ago
Probable Innocence Revisited
In this paper we propose a formalization of probable innocence, a notion of probabilistic anonymity that is associated to “realistic” protocols such as Crowds. We analyze crit...
Konstantinos Chatzikokolakis, Catuscia Palamidessi
130
Voted
IFIP
2005
Springer
15 years 9 months ago
Type-Based Distributed Access Control vs. Untyped Attackers
This paper considers the effect of untyped attackers inside a distributed system where security is enforced by the type system. In previous work we introduced the Key-Based Decentr...
Tom Chothia, Dominic Duggan
114
Voted
IFIP
2005
Springer
15 years 9 months ago
A Logic for Analysing Subterfuge in Delegation Chains
Abstract. Trust Management is an approach to construct and interpret the trust relationships among public-keys that are used to mediate security-critical actions. Cryptographic cre...
Hongbin Zhou, Simon N. Foley
101
Voted
IFIP
2005
Springer
15 years 9 months ago
Forensic Analysis of Mobile Phone Internal Memory
Mobile phones have become a very important tool for personal communication. It is therefore of great importance that forensic investigators have possibilities to extract evidence ...
Svein Willassen
« Prev « First page 1972 / 2134 Last » Next »