Sciweavers

5255 search results - page 107 / 1051
» Formal Methods for Privacy
Sort
View
CCS
2006
ACM
15 years 6 months ago
Evading network anomaly detection systems: formal reasoning and practical techniques
Attackers often try to evade an intrusion detection system (IDS) when launching their attacks. There have been several published studies in evasion attacks, some with available to...
Prahlad Fogla, Wenke Lee
CCS
2010
ACM
15 years 2 months ago
On the soundness of authenticate-then-encrypt: formalizing the malleability of symmetric encryption
A communication channel from an honest sender A to an honest receiver B can be described as a system with three interfaces labeled A, B, and E (the adversary), respectively, where...
Ueli Maurer, Björn Tackmann
OOPSLA
1997
Springer
15 years 6 months ago
Parasitic Methods: An Implementation of Multi-Methods for Java
In an object-oriented programming language, method selection is (usually) done at run-time using the class of the receiver. Some object-orientedlanguages(such as CLOS) have multi-...
John Boyland, Giuseppe Castagna
113
Voted
TSE
2002
125views more  TSE 2002»
15 years 2 months ago
An Automated Verification Method for Distributed Systems Software Based on Model Extraction
Gerard J. Holzmann, Margaret H. Smith
102
Voted
NDSS
2007
IEEE
15 years 8 months ago
Cryptographic Methods for Storing Ballots on a Voting Machine
A direct recording electronic (DRE) voting machine must satisfy several requirements to ensure voter privacy and the integrity of the election. A recent proposal for a vote storag...
John Bethencourt, Dan Boneh, Brent Waters