Sciweavers

889 search results - page 102 / 178
» Problems in Rewriting III
Sort
View
CORR
2011
Springer
175views Education» more  CORR 2011»
13 years 1 months ago
Extracting and Verifying Cryptographic Models from C Protocol Code by Symbolic Execution
Consider the problem of verifying security properties of a cryptographic protocol coded in C. We propose an automatic solution that needs neither a pre-existing protocol descripti...
Mihhail Aizatulin, Andrew D. Gordon, Jan Jürj...
HICSS
2011
IEEE
183views Biometrics» more  HICSS 2011»
13 years 1 months ago
Optimizing Access across Multiple Hierarchies in Data Warehouses
In enterprise data warehouses, different users in different business units often define their own application specific dimension hierarchies tailor made to their reporting and b...
Lipyeow Lim, Bishwaranjan Bhattacharjee
FORTE
2011
13 years 1 months ago
Analyzing BGP Instances in Maude
Analyzing Border Gateway Protocol (BGP) instances is a crucial step in the design and implementation of safe BGP systems. Today, the analysis is a manual and tedious process. Resea...
Anduo Wang, Carolyn L. Talcott, Limin Jia, Boon Th...
CCS
2011
ACM
12 years 10 months ago
Automatically optimizing secure computation
On the one hand, compilers for secure computation protocols, such as FairPlay or FairPlayMP, have significantly simplified the development of such protocols. On the other hand, ...
Florian Kerschbaum
ESORICS
2011
Springer
12 years 9 months ago
Supporting Concurrency in Private Data Outsourcing
Abstract. With outsourcing emerging as a successful paradigm for delegating data and service management to third parties, the problem of guaranteeing proper privacy protection agai...
Sabrina De Capitani di Vimercati, Sara Foresti, St...