IMDEA

Results: 286



#Item
91Generalizing Permissive-Upgrade in Dynamic Information Flow Analysis Abhishek Bichhawat∗ , Vineet Rajani† , Deepak Garg† , Christian Hammer∗ ∗ Saarland University, {bichhawat,hammer}@cs.uni-saarland.de † MPI-

Generalizing Permissive-Upgrade in Dynamic Information Flow Analysis Abhishek Bichhawat∗ , Vineet Rajani† , Deepak Garg† , Christian Hammer∗ ∗ Saarland University, {bichhawat,hammer}@cs.uni-saarland.de † MPI-

Add to Reading List

Source URL: software.imdea.org

Language: English - Date: 2014-07-17 09:25:54
92Is Content Publishing in BitTorrent Altruistic or Profit-Driven? Rubén Cuevas (UC3M), Michal Kryczka (Institute IMDEA Networks), Angel Cuevas (UC3M), Sebastian Kaune (TU Darmstadt), Carmen Guerrero (UC3M) and Reza Rejai

Is Content Publishing in BitTorrent Altruistic or Profit-Driven? Rubén Cuevas (UC3M), Michal Kryczka (Institute IMDEA Networks), Angel Cuevas (UC3M), Sebastian Kaune (TU Darmstadt), Carmen Guerrero (UC3M) and Reza Rejai

Add to Reading List

Source URL: mirage.cs.uoregon.edu

Language: English - Date: 2014-10-08 17:07:30
    93A tool for automating the computationally complete symbolic attacker (Extended Abstract) Hubert Comon-Lundh V´eronique Cortier

    A tool for automating the computationally complete symbolic attacker (Extended Abstract) Hubert Comon-Lundh V´eronique Cortier

    Add to Reading List

    Source URL: software.imdea.org

    Language: English - Date: 2014-07-17 09:25:52
    94Protocol Indistinguishability and the Computationally Complete Symbolic Attacker (Extended Abstract) Gergei Bana INRIA Paris, France

    Protocol Indistinguishability and the Computationally Complete Symbolic Attacker (Extended Abstract) Gergei Bana INRIA Paris, France

    Add to Reading List

    Source URL: software.imdea.org

    Language: English - Date: 2014-07-17 09:25:52
    95Towards Timed Models for Cyber-Physical Security Protocols Max Kanovich∗ , Tajana Ban Kirigin† , Vivek Nigam‡ , Andre Scedrov§ and Carolyn Talcott¶ ∗  ∗

    Towards Timed Models for Cyber-Physical Security Protocols Max Kanovich∗ , Tajana Ban Kirigin† , Vivek Nigam‡ , Andre Scedrov§ and Carolyn Talcott¶ ∗ ∗

    Add to Reading List

    Source URL: software.imdea.org

    Language: English - Date: 2014-07-17 09:25:54
    96Programming Paradigm Driven Heap Analysis Mark Marron1 1 IMDEA Ondˇrej Lhoták2

    Programming Paradigm Driven Heap Analysis Mark Marron1 1 IMDEA Ondˇrej Lhoták2

    Add to Reading List

    Source URL: plg.uwaterloo.ca

    Language: English - Date: 2012-01-06 02:33:52
      97On duality relations for session types Giovanni Bernardi1 , Ornela Dardha2 , Simon J. Gay2 , and Dimitrios Kouzapas2,3 1 IMDEA Software Institute, Madrid, Spain

      On duality relations for session types Giovanni Bernardi1 , Ornela Dardha2 , Simon J. Gay2 , and Dimitrios Kouzapas2,3 1 IMDEA Software Institute, Madrid, Spain

      Add to Reading List

      Source URL: www.cs.le.ac.uk

      Language: English - Date: 2014-07-28 09:33:05
        98Verified Computational Differential Privacy with Applications to Smart Metering Gilles Barthe∗ , George Danezis‡ , Benjamin Gr´egoire† , C´esar Kunz∗ , Santiago Zanella-B´eguelin‡ ∗ IMDEA † INRIA

        Verified Computational Differential Privacy with Applications to Smart Metering Gilles Barthe∗ , George Danezis‡ , Benjamin Gr´egoire† , C´esar Kunz∗ , Santiago Zanella-B´eguelin‡ ∗ IMDEA † INRIA

        Add to Reading List

        Source URL: www0.cs.ucl.ac.uk

        Language: English - Date: 2013-11-04 03:36:31
        99Characterising Testing Preorders for Broadcasting Distributed Systems? Andrea Cerone1 and Matthew Hennessy2 1  IMDEA Software Institute, 2 Trinity College Dublin

        Characterising Testing Preorders for Broadcasting Distributed Systems? Andrea Cerone1 and Matthew Hennessy2 1 IMDEA Software Institute, 2 Trinity College Dublin

        Add to Reading List

        Source URL: www.cs.le.ac.uk

        Language: English - Date: 2014-07-28 09:33:06
          100Micro-Policies: Formally Verified Tagging Schemes for Safety and Security (Extended Abstract) C˘at˘alin Hrit¸cu (INRIA Paris)1 Today’s computer systems are distressingly insecure. A host of vulnerabilities arise fro

          Micro-Policies: Formally Verified Tagging Schemes for Safety and Security (Extended Abstract) C˘at˘alin Hrit¸cu (INRIA Paris)1 Today’s computer systems are distressingly insecure. A host of vulnerabilities arise fro

          Add to Reading List

          Source URL: software.imdea.org

          Language: English - Date: 2014-07-17 09:25:53