Sciweavers

2812 search results - page 2 / 563
» Secrecy in Multiagent Systems
Sort
View
CSFW
2006
IEEE
14 years 1 months ago
Secrecy by Typing and File-Access Control
Secrecy properties can be guaranteed through a combination of static and dynamic checks. The static checks may include the application of special type systems with notions of secr...
Avik Chaudhuri, Martín Abadi
CORR
2006
Springer
151views Education» more  CORR 2006»
13 years 7 months ago
On the Secrecy Capacity of Fading Channels
We consider the secure transmission of information over an ergodic fading channel in the presence of an eavesdropper. Our eavesdropper can be viewed as the wireless counterpart of...
Praveen Kumar Gopala, Lifeng Lai, Hesham El Gamal
ECCV
2004
Springer
14 years 22 days ago
Capacity and Examples of Template-Protecting Biometric Authentication Systems
Abstract. In this paper, we formulate the requirements for privacy protecting biometric authentication systems. The secrecy capacity Cs is investigated for the discrete and the con...
Pim Tuyls, Jasper Goseling
ENTCS
2007
88views more  ENTCS 2007»
13 years 7 months ago
Keeping Secrets in Resource Aware Components
We present a powerful and flexible method for automatically checking the secrecy of values inside components. In our framework an attacker may monitor the external communication ...
Tom Chothia, Jun Pang, Muhammad Torabi Dashti
APLAS
2006
ACM
14 years 1 months ago
Computational Secrecy by Typing for the Pi Calculus
We define and study a distributed cryptographic implementation for an asynchronous pi calculus. At the source level, we adapt simple type systems designed for establishing formal ...
Martín Abadi, Ricardo Corin, Cédric ...