Sciweavers

516 search results - page 30 / 104
» Comparing Two Information Flow Security Properties
Sort
View
POPL
2008
ACM
14 years 9 months ago
Cryptographically sound implementations for typed information-flow security
In language-based security, confidentiality and integrity policies conveniently specify the permitted flows of information between different parts of a program with diverse levels...
Cédric Fournet, Tamara Rezk
JSAC
2008
121views more  JSAC 2008»
13 years 8 months ago
Network Coding Games with Unicast Flows
Abstract--To implement network coding, users need to coordinate and cooperate with respect to their strategies in terms of duplicating and transmitting side information across spec...
Jennifer Price, Tara Javidi
GLOBECOM
2008
IEEE
14 years 3 months ago
Transport of Long-Range Dependent Traffic in Single-Hop and Multi-Hop IEEE 802.11e Networks
 Long-range dependence (LRD) is a widely verified property of traffic crossing the wireless LAN radio interface. LRD severely affects network performance yielding longer queuing...
Stefano Bregni, Paolo Giacomazzi, Gabriella Saddem...
SIGCOMM
2010
ACM
13 years 9 months ago
ASTUTE: detecting a different class of traffic anomalies
When many flows are multiplexed on a non-saturated link, their volume changes over short timescales tend to cancel each other out, making the average change across flows close to ...
Fernando Silveira, Christophe Diot, Nina Taft, Ram...
TCS
2008
13 years 8 months ago
Cryptographically-masked flows
Abstract. Cryptographic operations are essential for many security-critical systems. Reasoning about information flow in such systems is challenging because typical (noninterferenc...
Aslan Askarov, Daniel Hedin, Andrei Sabelfeld