Sciweavers

619 search results - page 104 / 124
» Learning with Security
Sort
View
TCC
2005
Springer
103views Cryptology» more  TCC 2005»
14 years 2 months ago
Fair-Zero Knowledge
Abstract. We introduce Fair Zero-Knowledge, a multi-verifier ZK system where every proof is guaranteed to be “zero-knowledge for all verifiers.” That is, if an honest verifi...
Matt Lepinski, Silvio Micali, Abhi Shelat
RAID
2004
Springer
14 years 2 months ago
Attack Analysis and Detection for Ad Hoc Routing Protocols
Abstract. Attack analysis is a challenging problem, especially in emerging environments where there are few known attack cases. One such new environment is the Mobile Ad hoc Networ...
Yi-an Huang, Wenke Lee
SAFECOMP
2004
Springer
14 years 2 months ago
Using Fuzzy Self-Organising Maps for Safety Critical Systems
This paper defines a type of constrained artificial neural network (ANN) that enables analytical certification arguments whilst retaining valuable performance characteristics. ...
Zeshan Kurd, Tim Kelly
WSNA
2003
ACM
14 years 2 months ago
MANTIS: system support for multimodAl NeTworks of in-situ sensors
The MANTIS MultimodAl system for NeTworks of In-situ wireless Sensors provides a new multithreaded embedded operating system integrated with a general-purpose single-board hardwar...
Hector Abrach, Shah Bhatti, James Carlson, Hui Dai...
PASTE
2010
ACM
14 years 1 months ago
Extracting compiler provenance from program binaries
We present a novel technique that identifies the source compiler of program binaries, an important element of program provenance. Program provenance answers fundamental questions...
Nathan E. Rosenblum, Barton P. Miller, Xiaojin Zhu