Sciweavers

1599 search results - page 37 / 320
» Probabilistic Analysis of Anonymity
Sort
View
DAC
2001
ACM
14 years 11 months ago
Fast Statistical Timing Analysis By Probabilistic Event Propagation
Jing-Jia Liou, Kwang-Ting Cheng, Sandip Kundu, Ang...
CADE
2010
Springer
13 years 11 months ago
Automating Security Analysis: Symbolic Equivalence of Constraint Systems
We consider security properties of cryptographic protocols, that are either trace properties (such as confidentiality or authenticity) or equivalence properties (such as anonymity ...
Vincent Cheval, Hubert Comon-Lundh, Stéphan...
ESORICS
2009
Springer
14 years 5 months ago
Privacy Preserving Publication of Moving Object Data
The increasing availability of space-time trajectories left by location-aware devices is expected to enable novel classes of applications where the discovery of consumable, concise...
Francesco Bonchi
WPES
2006
ACM
14 years 4 months ago
Nonesuch: a mix network with sender unobservability
Oblivious submission to anonymity systems is a process by which a message may be submitted in such a way that neither the anonymity network nor a global passive adversary may dete...
Thomas S. Heydt-Benjamin, Andrei Serjantov, Beness...
ETFA
2008
IEEE
14 years 4 months ago
Reactivity analysis of different Networked Automation System architectures
The reactivity of Networked Automation Systems (NAS) has direct influence on safety and quality aspects. It can be determined by a response time analysis, which itself can be calc...
Jürgen Greifeneder, Georg Frey