Sciweavers

1653 search results - page 200 / 331
» Timed analysis of security protocols
Sort
View
MICRO
2006
IEEE
124views Hardware» more  MICRO 2006»
14 years 4 months ago
LIFT: A Low-Overhead Practical Information Flow Tracking System for Detecting Security Attacks
Computer security is severely threatened by software vulnerabilities. Prior work shows that information flow tracking (also referred to as taint analysis) is a promising techniqu...
Feng Qin, Cheng Wang, Zhenmin Li, Ho-Seop Kim, Yua...
PKC
2009
Springer
126views Cryptology» more  PKC 2009»
14 years 10 months ago
Verifiable Rotation of Homomorphic Encryptions
Similar to verifiable shuffling (or, mixing), we consider the problem of verifiable rotating (and random re-encrypting) a given list of homomorphic encryptions. The offset by which...
Sebastiaan de Hoogh, Berry Schoenmakers, Boris Sko...
ASIACRYPT
2001
Springer
14 years 2 months ago
Fully Distributed Threshold RSA under Standard Assumptions
The aim of this article is to propose a fully distributed environment for the RSA scheme. What we have in mind is highly sensitive applications and even if we are ready to pay a pr...
Pierre-Alain Fouque, Jacques Stern
INFOCOM
2010
IEEE
13 years 8 months ago
Throughput Analysis of Multiple Access Relay Channel under Collision Model
—Despite much research on the throughput of relaying networks under idealized interference models, many practical wireless networks rely on physical-layer protocols that preclude...
Seyed A. Hejazi, Ben Liang
ATVA
2009
Springer
89views Hardware» more  ATVA 2009»
14 years 4 months ago
A Data Symmetry Reduction Technique for Temporal-epistemic Logic
We present a data symmetry reduction approach for model temporal-epistemic logic. The technique abstracts the epistemic indistinguishably relation for the knowledge operators, and ...
Mika Cohen, Mads Dam, Alessio Lomuscio, Hongyang Q...