Sciweavers

3318 search results - page 178 / 664
» The Weak Instance Model
Sort
View
AINA
2004
IEEE
14 years 6 hour ago
Using the Extension Function of XSLT and DSL to Secure XML Documents
XSLT is a very popular and flexible language for transforming XML documents which provides a powerful implementation of a tree-oriented transformation language for transmuting ins...
Tao-Ku Chang, Gwan-Hwan Hwang
DAGSTUHL
2003
13 years 9 months ago
Operational Semantics of Security Protocols
Based on a concise domain analysis we develop a formal semantics of security protocols. Its main virtue is that it is a generic model, in the sense that it is parameterized over e...
Cas J. F. Cremers, Sjouke Mauw
ESORICS
2009
Springer
14 years 8 months ago
Secure Evaluation of Private Linear Branching Programs with Medical Applications
Abstract. Diagnostic and classification algorithms play an important role in data analysis, with applications in areas such as health care, fault diagnostics, or benchmarking. Bran...
Mauro Barni, Pierluigi Failla, Vladimir Kolesnikov...
STOC
2005
ACM
142views Algorithms» more  STOC 2005»
14 years 8 months ago
Market equilibrium via the excess demand function
We consider the problem of computing market equilibria and show three results. (i) For exchange economies satisfying weak gross substitutability we analyze a simple discrete versi...
Bruno Codenotti, Benton McCune, Kasturi R. Varadar...
WINE
2007
Springer
191views Economy» more  WINE 2007»
14 years 2 months ago
The Importance of Network Topology in Local Contribution Games
We consider a model of content contribution in peer-to-peer networks with linear quadratic payoffs and very general interaction patterns. We find that Nash equilibria of this gam...
Jacomo Corbo, Antoni Calvó-Armengol, David ...