Sciweavers

977 search results - page 37 / 196
» Soft Constraints for Security
Sort
View
DSRT
2008
IEEE
15 years 4 months ago
Modeling System Security Rules with Time Constraints Using Timed Extended Finite State Machines
Security and reliability are of paramount importance in designing and building real-time systems because any security failure can put the public and the environment at risk. In th...
Wissam Mallouli, Amel Mammar, Ana R. Cavalli
CCS
2001
ACM
15 years 2 months ago
Constraint solving for bounded-process cryptographic protocol analysis
The reachability problem for cryptographic protocols with nonatomic keys can be solved via a simple constraint satisfaction procedure.
Jonathan K. Millen, Vitaly Shmatikov
SAS
2004
Springer
132views Formal Methods» more  SAS 2004»
15 years 3 months ago
Modular and Constraint-Based Information Flow Inference for an Object-Oriented Language
Abstract. This paper addresses the problem of checking programs written in an object-oriented language to ensure that they satisfy the information flow policies, confidentiality ...
Qi Sun, Anindya Banerjee, David A. Naumann
ICC
2007
IEEE
134views Communications» more  ICC 2007»
15 years 4 months ago
Linear Cooperative Multiuser MIMO Transceiver Design with Per BS Power Constraints
— Joint cooperative processing of transmitted signal from several multiple-input multiple-output (MIMO) base station (BS) antenna heads is considered for users located within a s...
Antti Tölli, Marian Codreanu, Markku J. Juntt...
GLOBECOM
2008
IEEE
15 years 4 months ago
Blind Turbo Channel Estimation of QAM Signals Exploiting Code Constraints
—We present a blind turbo equalizer for QAM signals that exploits the statistics that a channel code imposes on the transmitted signal. The receiver is an adaptation of previous ...
André Fonseca dos Santos, Wolfgang Rave, Ge...