Sciweavers

1005 search results - page 55 / 201
» Practical Secure Function Evaluation
Sort
View
SBMF
2010
Springer
129views Formal Methods» more  SBMF 2010»
13 years 3 months ago
Directed Model Checking for B: An Evaluation and New Techniques
ProB is a model checker for high-level formalisms such as B, Event-B, CSP and Z. ProB uses a mixed depth-first/breadth-first search strategy, and in previous work we have argued th...
Michael Leuschel, Jens Bendisposto
APSEC
2009
IEEE
13 years 6 months ago
A Formal Framework to Integrate Timed Security Rules within a TEFSM-Based System Specification
Abstract--Formal methods are very useful in software industry and are becoming of paramount importance in practical engineering techniques. They involve the design and the modeling...
Wissam Mallouli, Amel Mammar, Ana R. Cavalli
ICASSP
2008
IEEE
14 years 3 months ago
Source coding with intermittent and degraded side information at the decoder
Practical schemes for distributed video coding with side information at the decoder need to consider non-standard correlation models in order to take non-stationarities into accou...
Francesca Bassi, Michel Kieffer, Claudio Weidmann
WINET
2010
199views more  WINET 2010»
13 years 7 months ago
Secure encrypted-data aggregation for wireless sensor networks
This paper proposes a secure encrypted-data aggregation scheme for wireless sensor networks. Our design for data aggregation eliminates redundant sensor readings without using encr...
Shih-I Huang, Shiuhpyng Shieh, J. D. Tygar
IANDC
2007
94views more  IANDC 2007»
13 years 8 months ago
Mediating secure information flow policies
In this paper we study secure information flow policies in the sense of Meadows [12] and others for aggregated datasets, collectively. We first present a method for combining di...
Guo-Qiang Zhang