Learn More
Coercion-resistance is the most effective property to fight coercive attacks in Internet elections. This notion was introduced by Juels, Catalano, and Jakobsson (JCJ) at WPES 2005 together with a voting protocol that satisfies such a stringent security requirement. Unfortunately , their scheme has a quadratic complexity (the overhead for tallying(More)
Clustering is an active research topic in data mining and different methods have been proposed in the literature. Most of these methods are based on the use of a distance measure defined either on numerical attributes or on categorical attributes. However, in fields such as road traffic and medicine, datasets are composed of numerical and categorical(More)
We relate two diierent approaches for the speciication and veriication of hybrid systems. The rst one is logic-based and uses the framework of the Calculus of Durations (CoD), the second one is automata-based and uses algorithmic analysis techniques for hybrid automata. Fragments of CoD have been identiied in 13, 19] for the description of control systems(More)
SUMMARY Non-interference is a strong security policy that enforces the confidentiality and integrity. Many solutions are proposed in the state of the art for verifying this policy in programs, but few tools are proposed to implement it. In this paper, we define a high level model called CIF (Component Information Flow) and we develop the tools that simplify(More)
Automating the construction of secure distributed systems becomes necessary. Indeed, developing security code requires a deep expertise and verifying that the developed code respects the specified policy is a tedious task. In this paper, we define a toolkit called CIF (Component Information Flow) that automates the development of secure distributed systems.(More)