Sciweavers

80 search results - page 3 / 16
» The Logic of Perfect MV-algebras
Sort
View
CHES
2005
Springer
100views Cryptology» more  CHES 2005»
14 years 3 months ago
Masked Dual-Rail Pre-charge Logic: DPA-Resistance Without Routing Constraints
During the last years, several logic styles that counteract side-channel attacks have been proposed. They all have in common that their level of resistance heavily depends on imple...
Thomas Popp, Stefan Mangard
TARK
2007
Springer
14 years 3 months ago
Preservation of epistemic properties in security protocol implementations
We introduce (i) a general class of security protocols with private channel as cryptographic primitive and (ii) a probabilistic epistemic logic to express properties of security pr...
Ron van der Meyden, Thomas Wilke
PODS
2010
ACM
181views Database» more  PODS 2010»
14 years 2 months ago
Schema design for XML repositories: complexity and tractability
Abiteboul et al. initiated the systematic study of distributed XML documents consisting of several logical parts, possibly located on different machines. The physical distributio...
Wim Martens, Matthias Niewerth, Thomas Schwentick
PACT
2001
Springer
14 years 2 months ago
Static Analysis for Secrecy and Non-interference in Networks of Processes
We introduce the νSPI-calculus that strengthens the notion of “perfect symmetric cryptography” of the spi-calculus by taking time into account. This involves defining an oper...
Chiara Bodei, Pierpaolo Degano, Flemming Nielson, ...
CONCUR
2007
Springer
14 years 4 months ago
Pushdown Module Checking with Imperfect Information
The model checking problem for finite-state open systems (module checking) has been extensively studied in the literature, both in the context of environments with perfect and imp...
Benjamin Aminof, Aniello Murano, Moshe Y. Vardi