Sciweavers

674 search results - page 116 / 135
» Using Abuse Case Models for Security Requirements Analysis
Sort
View
CRYPTO
2011
Springer
237views Cryptology» more  CRYPTO 2011»
12 years 8 months ago
Bi-Deniable Public-Key Encryption
In CRYPTO 1997, Canetti et al.put forward the intruiging notion of deniable encryption, which (informally) allows a sender and/or receiver, having already performed some encrypted...
Adam O'Neill, Chris Peikert, Brent Waters
GLOBECOM
2010
IEEE
13 years 7 months ago
Studying the Relationships between Spatial Structures of Wireless Networks and Population Densities
In this paper we show how to quantify dependency between the node distributions of wireless networks and the underlying population densities. Furthermore, we show that a quantitati...
Maria Michalopoulou, Janne Riihijärvi, Petri ...
PLDI
2003
ACM
14 years 2 months ago
A practical flow-sensitive and context-sensitive C and C++ memory leak detector
This paper presents a static analysis tool that can automatically find memory leaks and deletions of dangling pointers in large C and C++ applications. We have developed a type s...
David L. Heine, Monica S. Lam
AINA
2007
IEEE
14 years 3 months ago
Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems
Abstract— Structured peer-to-peer systems have grown enormously because of their scalability, efficiency and reliability. These systems assign a unique identifier to each user ...
Sunam Ryu, Kevin R. B. Butler, Patrick Traynor, Pa...
CDC
2008
IEEE
152views Control Systems» more  CDC 2008»
14 years 3 months ago
Non-uniform small-gain theorems for systems with unstable invariant sets
— We consider the problem of small-gain analysis of asymptotic behavior in interconnected nonlinear dynamic systems. Mathematical models of these systems are allowed to be uncert...
Ivan Tyukin, Erik Steur, Henk Nijmeijer, Cees van ...