Sciweavers

5255 search results - page 128 / 1051
» Formal Methods for Privacy
Sort
View
124
Voted
IEEEARES
2006
IEEE
15 years 8 months ago
Feasibility of Multi-Protocol Attacks
Formal modeling and verification of security protocols typically assumes that a protocol is executed in isolation, without other protocols sharing the network. We investigate the...
Cas J. F. Cremers
CCS
2006
ACM
15 years 6 months ago
An intruder model for verifying liveness in security protocols
We present a process algebraic intruder model for verifying a class of liveness properties of security protocols. For this class, the proposed intruder model is proved to be equiv...
Jan Cederquist, Muhammad Torabi Dashti
122
Voted
SACRYPT
1998
Springer
15 years 6 months ago
Mix-Based Electronic Payments
We introduce a new payment architecture that limits the power of an attacker while providing the honest user with privacy. Our proposed method defends against all known attacks on ...
Markus Jakobsson, David M'Raïhi
TDP
2008
96views more  TDP 2008»
15 years 2 months ago
Constrained Microaggregation: Adding Constraints for Data Editing
Privacy preserving data mining and statistical disclosure control have introduced several methods for data perturbation that can be used for ensuring the privacy of data respondent...
Vicenç Torra
139
Voted
FMCAD
2000
Springer
15 years 6 months ago
Formal Verification of Floating Point Trigonometric Functions
Abstract. We have formal verified a number of algorithms for evaluating transcendental functions in double-extended precision floating point arithmetic in the Intel
John Harrison