Sciweavers

79 search results - page 5 / 16
» A Logic of Authentication
Sort
View
FOSSACS
2009
Springer
14 years 3 months ago
Cryptographic Protocol Composition via the Authentication Tests
Although cryptographic protocols are typically analyzed in isolation, they are used in combinations. If a protocol was analyzed alone and shown to meet some security goals, will it...
Joshua D. Guttman
PADL
2001
Springer
14 years 1 months ago
Specifying Authentication Protocols Using Rewriting and Strategies
Abstract. Programming with rewrite rules and strategies has been already used for describing several computational logics. This paper describes the way the Needham-Schroeder Public...
Horatiu Cirstea
IWIA
2005
IEEE
14 years 2 months ago
Malware Defense Using Network Security Authentication
Malware defenses have primarily relied upon intrusion fingerprints to detect suspicious network behavior. While effective for discovering computers that are already compromised,...
Joseph V. Antrosio, Errin W. Fulp
ICASSP
2007
IEEE
14 years 2 months ago
Adaptive Weight Estimation in Multi-Biometric Verification using Fuzzy Logic Decision Fusion
This paper describes a multi-biometric verification system that is fully adaptive to variability in data acquisition using fuzzy logic decision fusion. The system uses fuzzy logic...
Henry Pak-Sum Hui, Helen M. Meng, Man-Wai Mak
TLDI
2010
ACM
190views Formal Methods» more  TLDI 2010»
14 years 5 months ago
Distributed programming with distributed authorization
We propose a programming language, called PCML5, for building distributed applications with distributed access control. Target applications include web-based systems in which prog...
Kumar Avijit, Anupam Datta, Robert Harper