In this paper, we formally prove that padding the plaintext with a random bit-string provides the semantic security against chosen plaintext attack (IND-CPA) for the McEliece (and ...
In many software applications, users access application data using graphical user interfaces (GUIs). There is an important, but little explored, link between visualization and secu...
David A. Basin, Manuel Clavel, Marina Egea, Michae...
In this paper, we present a novel type and effect analysis for detecting type cast errors and memory errors in C source code. Our approach involves a type system with effect, regi...
An ad hoc network is a highly dynamic routing network cooperated by a set of wireless mobile nodes without any assistance of centralized access point. ARIADNE is a well-known secu...
Traceability links among different software engineering artifacts make explicit how a software system was implemented to accommodate its requirements. For secure and dependable so...