Sciweavers

146 search results - page 11 / 30
» Sequential Traitor Tracing
Sort
View
SEC
2003
13 years 10 months ago
Secure Audit Logging with Tamper-Resistant Hardware
Secure perimeter schemes (e.g. DRM) and tracing traitor schemes (e.g. watermarking, audit logging) strive to mitigate the problems of content escaping the control of the rights ho...
Cheun Ngen Chong, Zhonghong Peng, Pieter H. Hartel
CORR
2010
Springer
110views Education» more  CORR 2010»
13 years 9 months ago
Advanced Software Protection Now
We introduce a novel software-protection method, which can be fully implemented with today's technologies, that provides traitor tracing and license-enforcement functionalitie...
Diego Bendersky, Ariel Futoransky, Luciano Notarfr...
SPIN
2012
Springer
11 years 11 months ago
Counterexample Explanation by Anomaly Detection
Since counterexamples generated by model checking tools are only symptoms of faults in the model, a significant amount of manual work is required in order to locate the fault that...
Stefan Leue, Mitra Tabaei Befrouei
LICS
2000
IEEE
14 years 1 months ago
Precongruence Formats for Decorated Trace Preorders
This paper explores the connection between semantic equivalences and preorders for concrete sequential processes, represented by means of labelled transition systems, and formats ...
Bard Bloom, Wan Fokkink, Rob J. van Glabbeek
WOTUG
2008
13 years 10 months ago
Representation and Implementation of CSP and VCR Traces
Abstract. Communicating Sequential Processes (CSP) was developed around a formal algebra of processes and a semantics based on traces (and failures and divergences). A trace is a r...
Neil C. C. Brown, Marc L. Smith