Sciweavers

362 search results - page 65 / 73
» Extending the Resynchronization Attack
Sort
View
JMLR
2006
120views more  JMLR 2006»
13 years 8 months ago
Learning Parts-Based Representations of Data
Many perceptual models and theories hinge on treating objects as a collection of constituent parts. When applying these approaches to data, a fundamental problem arises: how can w...
David A. Ross, Richard S. Zemel
ENTCS
2007
88views more  ENTCS 2007»
13 years 8 months ago
Keeping Secrets in Resource Aware Components
We present a powerful and flexible method for automatically checking the secrecy of values inside components. In our framework an attacker may monitor the external communication ...
Tom Chothia, Jun Pang, Muhammad Torabi Dashti
TCS
2008
13 years 8 months ago
Cryptographically-masked flows
Abstract. Cryptographic operations are essential for many security-critical systems. Reasoning about information flow in such systems is challenging because typical (noninterferenc...
Aslan Askarov, Daniel Hedin, Andrei Sabelfeld
CORR
2002
Springer
95views Education» more  CORR 2002»
13 years 8 months ago
Value Based Argumentation Frameworks
In many cases of disagreement it is impossible to demonstrate that either party is wrong. The role of argument in such cases is to persuade rather than refute. Following Perelman, ...
Trevor J. M. Bench-Capon
FUIN
2000
71views more  FUIN 2000»
13 years 8 months ago
The Nondeterministic Information Logic NIL is PSPACE-complete
The nondeterministic information logic NIL has been introduced by Orlowska and Pawlak in 1984 as a logic for reasoning about total information systems with the similarity, the forw...
Stéphane Demri