Sciweavers

1061 search results - page 46 / 213
» A general definition of malware
Sort
View
TCC
2009
Springer
177views Cryptology» more  TCC 2009»
14 years 9 months ago
Composability and On-Line Deniability of Authentication
Abstract. Protocols for deniable authentication achieve seemingly paradoxical guarantees: upon completion of the protocol the receiver is convinced that the sender authenticated th...
Yevgeniy Dodis, Jonathan Katz, Adam Smith, Shabsi ...
ESORICS
2002
Springer
14 years 8 months ago
Computational Probabilistic Non-interference
In recent times information flow and non-interference have become very popular concepts for expressing both integrity and privacy properties. We present the first general definitio...
Michael Backes, Birgit Pfitzmann
SIGCPR
2005
ACM
66views Hardware» more  SIGCPR 2005»
14 years 2 months ago
Who is "the IT workforce"?: challenges facing policy makers, educators, management, and research
Despite over six decades of research on the role and definition of the IT workforce, there remain numerous, and often contradictory, definitions related to the identity of this gr...
Michelle L. Kaarst-Brown, Indira R. Guzman
EUROCRYPT
1998
Springer
14 years 22 days ago
Divertible Protocols and Atomic Proxy Cryptography
Abstract. First, we introduce the notion of divertibility as a protocol property as opposed to the existing notion as a language property (see Okamoto, Ohta [OO90]). We give a defi...
Matt Blaze, Gerrit Bleumer, Martin Strauss
ICCAD
1994
IEEE
134views Hardware» more  ICCAD 1994»
14 years 19 days ago
Boolean constrained encoding: a new formulation and a case study
1 This paper provides a new, generalized approach to the problem of encoding information as vectors of binary digits. We furnish a formal definition for the Boolean constrained enc...
Ney Laert Vilar Calazans