Now showing items 1-3 of 3

    • Cifuentes, F.; Bustos, J.; Simmonds Wagemann, Jocelyn Paola (2016)
      Formal verification means to rigorously explore the correctness of system designs expressed as mathematical models, most likely with the assistance of modern computers. Original approaches were to model and express a ...
    • Font, G.; Bustos, J.; Hevia Angulo, Alejandro (2016)
      Location privacy is a concern in mobile networks monitoring systems. We propose a model using homomorphic encryption, where researchers can compute aggregations, learning nothing more about users' location than the result ...
    • Bachmann, I.; Reyes, P.; Bustos, J.; Silva, A. (2016)
      When the resilience of a network is analyzed it is often studied alone, but in the real world networks usually interact with other networks establishing dependencies. The Internet at a BGP level is an example of this kind ...