Sciweavers

79 search results - page 7 / 16
» A Logic of Authentication
Sort
View
ASIAN
2006
Springer
116views Algorithms» more  ASIAN 2006»
14 years 10 days ago
Secrecy Analysis in Protocol Composition Logic
We present formal proof rules for inductive reasoning about the way that data transmitted on the network remains secret from a malicious attacker. Extending a compositional protoco...
Arnab Roy, Anupam Datta, Ante Derek, John C. Mitch...
DEON
2008
Springer
13 years 10 months ago
Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic
The security policy of an information system may include a wide range of different requirements. The literature has primarily focused on access and information flow control require...
Nora Cuppens-Boulahia, Frédéric Cupp...
TCAD
2008
92views more  TCAD 2008»
13 years 8 months ago
IP Watermarking Using Incremental Technology Mapping at Logic Synthesis Level
Abstract--This paper proposes an adaptive watermarking technique by modulating some closed cones in an originally optimized logic network (master design) for technology mapping. Th...
Aijiao Cui, Chip-Hong Chang, Sofiène Tahar
ARTCOM
2009
IEEE
14 years 3 months ago
ANFIS Approach for Navigation of Mobile Robots
— This paper, discusses about navigation control of mobile robot using adaptive neuro-fuzzy inference system (ANFIS) in a real word dynamic environment. In the ANFIS controller a...
Mukesh Kumar Singh, Dayal R. Parhi, Jayanta Kumar ...
CORR
2004
Springer
120views Education» more  CORR 2004»
13 years 8 months ago
Validating a Web Service Security Abstraction by Typing
Abstraction by Typing Andrew D. Gordon Microsoft Research Riccardo Pucella Cornell University An XML web service is, to a first approximation, an RPC service in which requests and...
Andrew D. Gordon, Riccardo Pucella