Iniciativa IMDEA
Resumen: Approximate fully homomorphic encryption (FHE) schemes such as the CKKS scheme (Asiacrypt ’17) are popular in practice d...
Resumen: In this talk I will present the work I have done concerning the specification and analysis of normative documents using ...
Resumen: This talk will show some of the recent advances we are doing at Microsoft Research towards agents capable of modeling co...
Resumen: Recent years have been pivotal in the field of Industrial Control Systems (ICS) security, with a large number of high-pr...
Resumen: Adversaries exploit vulnerabilities to compromise systems. For instance, a vulnerability in a Web browser sandbox may al...
Resumen: Cyber-physical systems (CPS) are now ubiquitous among automated technologies, in which physical dynamical systems are op...
Resumen: Many security mitigation techniques rely on program analysis. Languages such as C/C++ support the use of pointers for in...
Resumen: We live in an era of unprecedented compute availability. The advent of the cloud allows anyone to deploy critical high-p...
Resumen: Indistinguishability obfuscation turns a program unintelligible without altering its functionality. Because it captures ...
Resumen: This talk will go over the basics of the PageRank problem, studied initially by the founders of Google, which allowed th...
Resumen: A strong argument in favour of dynamically-typed programming languages is their flexibility, enabling quick code writing...