-
MINLPLib
- Referenced in 98 articles
[sw06172]
- used to transform industrial models that contain confidential information. Such transformations allow many of these...
-
KASUMI
- Referenced in 20 articles
[sw02926]
- UMTS, KASUMI is used in the confidentiality (f8) and integrity algorithms (f9) with names UEA1...
-
CryptDB
- Referenced in 16 articles
[sw27061]
- system that provides practical and provable confidentiality in the face of these attacks for applications...
-
sdcMicro
- Referenced in 10 articles
[sw07953]
- statistical agencies and other institutions are mostly confidential. This package can be used...
-
ConfiChair
- Referenced in 7 articles
[sw13266]
- cloud”, raising new privacy and confidentiality concerns. We propose a general technique for designing cloud...
-
Flow Caml
- Referenced in 6 articles
[sw08923]
- automatically check that they obey some confidentiality or integrity policy. In Flow Caml, standard...
-
V-MDAV
- Referenced in 6 articles
[sw11787]
- approach to obtain ing anonymized versions of confidential microdata. Optimally solving microaggregation on multivariate data...
-
synthpop
- Referenced in 6 articles
[sw17416]
- producing synthetic versions of microdata containing confidential information so that they are safe...
-
FlowDroid
- Referenced in 5 articles
[sw26741]
- ubiquitous source of private and confidential data. At the same time, smartphone users are plagued...
-
CoSMed
- Referenced in 3 articles
[sw17453]
- CoSMed: a confidentiality-verified social media platform. This paper describes progress with our agenda ... social media platform with verified document confidentiality. The system’s kernel is implemented and verified...
-
SCiFI
- Referenced in 4 articles
[sw33595]
- privacy of the subjects and the confidentiality of the database. A specific application of SCiFI...
-
Saturnin
- Referenced in 4 articles
[sw41873]
- only one call to Saturnin to provide confidentiality and integrity. • Saturnin-Hash...
-
SCTP
- Referenced in 2 articles
[sw03483]
- solution for authentication and key agreement; Data confidentiality is provided through encryption and decryption ... offered security differentiation and message overhead. Confidentiality protection of SCTP control information is, however, only...
-
VC3
- Referenced in 3 articles
[sw23078]
- hyper visor out of the TCB, thus, confidentiality and integrity are preserved even if these...
-
TFRP
- Referenced in 3 articles
[sw37089]
- techniques is widely used to protect confidentiality in statistical databases released for public...
-
EDSL
- Referenced in 1 article
[sw22616]
- computing, a client may request computation on confidential data that is sent to untrusted servers ... software must be properly structured to preserve confidentiality. Using a general definition of secure execution ... cryptographic cloud computing and prove correctness and confidentiality for two representative and distinctly different implementations...
-
MARISM-A
- Referenced in 2 articles
[sw02936]
- providing complex security mechanisms to protect migration, confidentiality and integrity of agents. This is indeed...
-
EFADS
- Referenced in 2 articles
[sw09459]
- analysis, we demonstrate that EFADS provides data confidentiality and data sharer’s anonymity without requiring...
-
Rmind
- Referenced in 2 articles
[sw21135]
- practical cryptographic method for processing confidential data. Research progress...
-
MAGERIT
- Referenced in 2 articles
[sw22127]
- through security measures that guarantee the authenticity, confidentiality, integrity and availability of the information systems...