Zobrazeno 1 - 10
of 20
pro vyhledávání: '"Jonathan Herzog"'
Autor:
Michael Reschly, Mayank Varia, Nicholas Hwang, Jonathan Herzog, Ariel Hamlin, Robert K. Cunningham, Jill Poland, Sophia Yakoubov, Benjamin Price
Publikováno v:
ACM SIGOPS Operating Systems Review. 49:22-30
This work presents the results of a three-year project that assessed nine different privacy-preserving data search systems. We detail the design of a software assessment framework that focuses on low system footprint, repeatability, and reusability.
Autor:
Jonathan Herzog
Publikováno v:
Journal of Policy History. 22:337-365
Autor:
Jonathan Herzog, Ran Canetti
Publikováno v:
Journal of Cryptology. 24:83-147
In light of the growing complexity of cryptographic protocols and applications, it becomes highly desirable to mechanize—and eventually automate—the security analysis of protocols. A natural step towards automation is to allow for symbolic securi
Publikováno v:
Journal of Computer Security. 17:737-797
In their seminal work, Abadi and Rogaway show that the formal (Dolev-Yao) notion of indistinguishability is sound with respect to the computational model: messages that are indistinguishable in the formal model become indistinguishable messages in th
Autor:
Jonathan Herzog, Ariel Hamlin
Publikováno v:
HPEC
In this paper, we describe the SPAR Test Suite Generator (STSG), a new test-suite generator for SQL style database systems. This tool produced an entire test suite (data, queries, and ground-truth answers) as a unit and in response to a user's specif
Publikováno v:
Statistics & Probability Letters. 38:167-175
Suppose that an urn contains m distinguishable balls, and that these balls are sampled (with replacement), thus generating a sequence of colors. Many questions can be asked about this sequence; the distribution of the time until a color is sampled tw
Cognitive networking mechanisms promise to greatly improve network performance over non-cognitive mechanisms, by making more efficient use of bandwidth, spectrum, and power. However, these mechanisms must be designed with cyber security in mind in or
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d2c3cc2d06f61c98f36374653a51ec7c
https://doi.org/10.21236/ada573492
https://doi.org/10.21236/ada573492
Autor:
Jonathan Herzog, Ronald L. Rivest, Ben Adida, Mike Bond, Amerson Lin, Jolyon Clulow, Paul Youn, Ross Anderson
Publikováno v:
Security Protocols ISBN: 9783642177729
So it’s a fairly provocative title, how did we get to that? Well automated tools have been successfully applied to modelling security protocols and finding attacks, and some good examples here are Gavin Lowe’s work, using FDR to model the Needham
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::0bb2aa9bfd65f369266684bbd34e97a3
https://doi.org/10.1007/978-3-642-17773-6_21
https://doi.org/10.1007/978-3-642-17773-6_21
Autor:
Paul Youn, Amerson Lin, Jolyon Clulow, Ross Anderson, Mike Bond, Ben Adida, Ronald L. Rivest, Jonathan Herzog
Publikováno v:
Security Protocols ISBN: 9783642177729
So it’s a fairly provocative title, how did we get to that? Well automated tools have been successfully applied to modelling security protocols and finding attacks, and some good examples here are Gavin Lowe’s work, using FDR to model the Needham
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f14bf5b3249e965b22550c8eacf13ea1
https://doi.org/10.1007/978-3-642-17773-6_22
https://doi.org/10.1007/978-3-642-17773-6_22
Autor:
Ran Canetti, Jonathan Herzog
Publikováno v:
Theory of Cryptography ISBN: 9783540327318
TCC
TCC
Symbolic analysis of cryptographic protocols is dramatically simpler than full-fledged cryptographic analysis. In particular, it is simple enough to be automated. However, symbolic analysis does not, by itself, provide any cryptographic soundness gua
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::eba40e776bb2dc545c2b8a83eb61112f
https://doi.org/10.1007/11681878_20
https://doi.org/10.1007/11681878_20