Browse Papers
From IFORS
Contact Us
English
Remember me
Login
Forgot password?
Keyword: security
Found
180 papers
in total
Date Descending
Date Ascending
Title Descending
Title Ascending
Secluded Connectivity Problems
2017,
Peleg David
Consider a setting where possibly sensitive information sent over a path in a network...
GOTCHA! Network-Based Fraud Detection for Social Security Fraud
2017,
Baesens Bart
We study the impact of network information for social security fraud detection. In a...
On the Information Ratio of Non-perfect Secret Sharing Schemes
2017,
Farrs Oriol
A secret sharing scheme is non‐perfect if some subsets of players that cannot...
On Virtual Grey Box Obfuscation for General Circuits
2017,
Bitansky Nir
An obfuscator O is Virtual Grey Box (VGB) for a class C of circuits if, for any C...
On the Impossibility of Cryptography with Tamperable Randomness
2017,
Austrin Per
We initiate a study of the security of cryptographic primitives in the presence of...
Scalable Zero Knowledge Via Cycles of Elliptic Curves
2017,
Ben-Sasson Eli
Non‐interactive zero‐knowledge proofs of knowledge for general NP...
How to Eat Your Entropy and Have it Too: Optimal Recovery Strategies for Compromised RNGs
2017,
Dodis Yevgeniy
Random number generators (RNGs) play a crucial role in many cryptographic schemes and...
Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation
2017,
Boneh Dan
In this work, we show how to use indistinguishability obfuscation to build multiparty...
Self-Bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications
2017,
Yamakawa Takashi
A self‐bilinear map is a bilinear map where the domain and target groups are...
On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input
2017,
Wichs Daniel
The notion of differing‐inputs obfuscation (diO) was introduced by Barak et al....
Agency Problems and Airport Security: Quantitative and Qualitative Evidence on the Impact of Security Training
2017,
Williams Julian
We analyze the issue of agency costs in aviation security by combining results from a...
Algorithm for the N-2 Security-Constrained Unit Commitment Problem with Transmission Switching
2017,
Schumacher Kathryn M
Most power grid systems are operated to be N ‐1 secure, meaning that the system...
An adaptive and diversified vehicle routing approach to reducing the security risk of cash-in-transit operations
2017,
Bozkaya Burcin
We consider the route optimization problem of transporting valuables in...
A simulation optimisation-based approach for team building in cyber security
2016,
Legato Pasquale
In this study we present a simulation optimisation (SO) approach based on...
The Security‐Development Nexus in European Union Foreign Relations after Lisbon: Policy Coherence at Last?
2017,
Furness Mark
One of the 2009 Lisbon Treaty's objectives was to enhance the coherence of...
Contagion in cyber security attacks
2017,
Williams Julian
Systems security is essential for the efficient operation of all organizations....
The impact of network inhomogeneities on contagion and system stability
2017,
Hbsch Arnd
This work extends the contagion model introduced by Nier et al. (J Econ Dyn Control...
When Being Hot Is Not Cool: Monitoring Hot Lists for Information Security
2016,
Kumar Subodha
We study operational and managerial problems arising in the context of security...
When Is a Network Epidemic Hard to Eliminate?
2017,
Ozdaglar Asuman
We consider the propagation of a contagion process (‘epidemic’) on a...
Computing B-Stationary Points of Nonsmooth DC Programs
2017,
Pang Jong-Shi
Motivated by a class of applied problems arising from physical layer based security in...
Patrolling a Border
2016,
Alpern Steve
Patrolling games were recently introduced to model the problem of protecting the nodes...
Managing Enterprise Risks of Technological Systems: An Exploratory Empirical Analysis of Vulnerability Characteristics as Drivers of Exploit Publication*
2016,
Heim Gregory R
Enterprises experience opportunistic exploits targeted at vulnerable technology....
Import Security: Assessing the Risks of Imported Food
2016,
Welburn Jonathan
We use data on food import violations from the FDA Operational and Administrative...
Radiological Risk Assessment by Convergence Methodology Model in RDD Scenarios
2016,
Rother Fagner C
A radiological dispersal device (RDD) is a simple weapon capable of causing human...
1
2
3
Last Page
Papers per page:
6 Papers
12 Papers
24 Papers
36 Papers
48 Papers