Sciweavers

3395 search results - page 75 / 679
» Computational Differential Privacy
Sort
View
TRUST
2009
Springer
14 years 5 months ago
Measuring Semantic Integrity for Remote Attestation
Fabrizio Baiardi, Diego Cilea, Daniele Sgandurra, ...
ISPEC
2010
Springer
14 years 4 months ago
On Fast and Approximate Attack Tree Computations
Abstract. In this paper we address the problem of inefficiency of exact attack tree computations. We propose several implementation-level optimizations and introduce a genetic algo...
Aivo Jürgenson, Jan Willemson
ICASSP
2009
IEEE
14 years 5 months ago
A differential geometric approach to discrete-coefficient filter design
This paper is concerned with the problem of computing a discretecoefficient approximation to a digital filter. In contrast to earlier works that have approached this problem usi...
Subramanian Ramamoorthy, Lothar Wenzel, James Nagl...
CCS
2010
ACM
13 years 11 months ago
Computational indistinguishability logic
Computational Indistinguishability Logic (CIL) is a logic for reasoning about cryptographic primitives in computational models. It captures reasoning patterns that are common in p...
Gilles Barthe, Marion Daubignard, Bruce M. Kapron,...
CSFW
2007
IEEE
14 years 5 months ago
Approximated Computationally Bounded Simulation Relations for Probabilistic Automata
We study simulation relations for Probabilistic Automata that require transitions to be matched up to negligible sets provided that computation lengths are polynomially bounded. T...
Roberto Segala, Andrea Turrini