Skip to main content

Showing 1–6 of 6 results for author: Cremers, C

Searching in archive cs. Search in all archives.
.
  1. arXiv:2005.12273  [pdf

    cs.CR cs.CY

    Decentralized Privacy-Preserving Proximity Tracing

    Authors: Carmela Troncoso, Mathias Payer, Jean-Pierre Hubaux, Marcel Salathé, James Larus, Edouard Bugnion, Wouter Lueks, Theresa Stadler, Apostolos Pyrgelis, Daniele Antonioli, Ludovic Barman, Sylvain Chatel, Kenneth Paterson, Srdjan Čapkun, David Basin, Jan Beutel, Dennis Jackson, Marc Roeschlin, Patrick Leu, Bart Preneel, Nigel Smart, Aysajan Abidin, Seda Gürses, Michael Veale, Cas Cremers , et al. (9 additional authors not shown)

    Abstract: This document describes and analyzes a system for secure and privacy-preserving proximity tracing at large scale. This system, referred to as DP3T, provides a technological foundation to help slow the spread of SARS-CoV-2 by simplifying and accelerating the process of notifying people who might have been exposed to the virus so that they can take appropriate measures to break its transmission chai… ▽ More

    Submitted 25 May, 2020; originally announced May 2020.

    Comments: 46 pages, 6 figures, first published 3 April 2020 on https://github.com/DP-3T/documents where companion documents and code can be found

  2. arXiv:1709.00194  [pdf, ps, other

    cs.CR

    Improving Automated Symbolic Analysis for E-voting Protocols: A Method Based on Sufficient Conditions for Ballot Secrecy

    Authors: Cas Cremers, Lucca Hirschi

    Abstract: We advance the state-of-the-art in automated symbolic analysis for e-voting protocols by introducing three conditions that together are sufficient to guarantee ballot secrecy. There are two main advantages to using our conditions, compared to existing automated approaches. The first is a substantial expansion of the class of protocols and threat models that can be automatically analysed: we can sy… ▽ More

    Submitted 15 March, 2019; v1 submitted 1 September, 2017; originally announced September 2017.

    Comments: Accepted for publication at EURO S&P 2019

    ACM Class: D.4.6; D.2.4; C.2.2

  3. arXiv:0905.3318  [pdf

    cs.CL cs.DB cs.DS cs.IR cs.PL

    An Object-Oriented and Fast Lexicon for Semantic Generation

    Authors: Maarten Hijzelendoorn, Crit Cremers

    Abstract: This paper is about the technical design of a large computational lexicon, its storage, and its access from a Prolog environment. Traditionally, efficient access and storage of data structures is implemented by a relational database management system. In Delilah, a lexicon-based NLP system, efficient access to the lexicon by the semantic generator is vital. We show that our highly detailed HPSG-… ▽ More

    Submitted 20 May, 2009; originally announced May 2009.

    Comments: Paper presented at the 18th Computational Linguistics In the Netherlands Meeting (CLIN), Nijmegen, 10 December 2007, 15pp

  4. arXiv:0709.1080  [pdf, ps, other

    cs.CR cs.LO

    On the Protocol Composition Logic PCL

    Authors: Cas Cremers

    Abstract: A recent development in formal security protocol analysis is the Protocol Composition Logic (PCL). We identify a number of problems with this logic as well as with extensions of the logic, as defined in [DDMP05,HSD+05,He05,Dat05,Der06,DDMR07]. The identified problems imply strong restrictions on the scope of PCL, and imply that some currently claimed PCL proofs cannot be proven within the logic,… ▽ More

    Submitted 22 February, 2008; v1 submitted 7 September, 2007; originally announced September 2007.

  5. arXiv:cs/0611062  [pdf, ps, other

    cs.CR

    A framework for compositional verification of security protocols

    Authors: Suzana Andova, Cas Cremers, Kristian Gjosteen, Sjouke Mauw, Stig F. Mjolsnes, Sasa Radomirovic

    Abstract: Automatic security protocol analysis is currently feasible only for small protocols. Since larger protocols quite often are composed of many small protocols, compositional analysis is an attractive, but non-trivial approach. We have developed a framework for compositional analysis of a large class of security protocols. The framework is intended to facilitate automatic as well as manual verifi… ▽ More

    Submitted 1 May, 2007; v1 submitted 14 November, 2006; originally announced November 2006.

  6. arXiv:cmp-lg/9605011  [pdf, ps

    cs.CL

    Counting Coordination Categorially

    Authors: Crit Cremers, Maarten Hijzelendoorn

    Abstract: This paper presents a way of reducing the complexity of parsing free coordination. It lives on the Coordinative Count Invariant, a property of derivable sequences in occurrence-sensitive categorial grammar. This invariant can be exploited to cut down deterministically the search space for coordinated sentences to minimal fractions. The invariant is based on inequalities, which is shown to be the… ▽ More

    Submitted 7 May, 1996; v1 submitted 6 May, 1996; originally announced May 1996.

    Comments: 7 pages, PostScript