Sciweavers

1843 search results - page 93 / 369
» Securing Class Initialization
Sort
View
117
Voted
CSFW
2009
IEEE
15 years 9 months ago
A Method for Proving Observational Equivalence
—Formal methods have proved their usefulness for analyzing the security of protocols. Most existing results focus on trace properties like secrecy (expressed as a reachability pr...
Véronique Cortier, Stéphanie Delaune
HICSS
2006
IEEE
140views Biometrics» more  HICSS 2006»
15 years 8 months ago
Programming Education in the Era of the Internet: A Paradigm Shift
Over the last several years, the Computer Science (CS) community has put a great deal of effort in to the area of security research, and have made great advances. Counterintuitive...
Scott Harrison, Nadine Hanebutte, Jim Alves-Foss
66
Voted
DAGSTUHL
2006
15 years 4 months ago
On impossibility of sequential algorithmic forecasting
The problem of prediction future event given an individual sequence of past events is considered. Predictions are given in form of real numbers pn which are computed by some algori...
Vladimir V. V'yugin
125
Voted
IJCV
2008
167views more  IJCV 2008»
15 years 2 months ago
Learning Layered Motion Segmentations of Video
We present an unsupervised approach for learning a generative layered representation of a scene from a video for motion segmentation. The learnt model is a composition of layers, ...
M. Pawan Kumar, Philip H. S. Torr, Andrew Zisserma...
ICALP
2007
Springer
15 years 4 months ago
Trading Static for Adaptive Security in Universally Composable Zero-Knowledge
Adaptive security, while more realistic as an adversarial model, is typically much harder to achieve compared to static security in cryptographic protocol design. Universal composi...
Aggelos Kiayias, Hong-Sheng Zhou