Sciweavers

671 search results - page 109 / 135
» A Modeling Framework for Generating Security Protocol Specif...
Sort
View
ICICS
2007
Springer
14 years 10 days ago
Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures
Authentication is increasingly relevant to data management. Data is being outsourced to untrusted servers and clients want to securely update and query their data. For example, in ...
Charalampos Papamanthou, Roberto Tamassia
IJCV
2008
106views more  IJCV 2008»
13 years 8 months ago
Evaluation of Localized Semantics: Data, Methodology, and Experiments
We present a new data set encoding localized semantics for 1014 images and a methodology for using this kind of data for recognition evaluation. This methodology establishes protoc...
Kobus Barnard, Quanfu Fan, Ranjini Swaminathan, An...
INFOCOM
2006
IEEE
14 years 2 months ago
Establishing Pair-Wise Keys in Heterogeneous Sensor Networks
— Many applications that make use of sensor networks require secure communication. Because asymmetric-key solutions are difficult to implement in such a resource-constrained env...
Patrick Traynor, Heesook Choi, Guohong Cao, Sencun...
ICSE
2007
IEEE-ACM
14 years 8 months ago
Testing and Analysis of Access Control Policies
Policy testing and analysis are important techniques for high assurance of correct specification of access control policies. We propose a set of testing and analysis techniques fo...
Evan Martin
ISORC
1998
IEEE
14 years 22 days ago
The Time-Triggered Architecture
The Time-Triggered Architecture (TTA) provides a computing infrastructure for the design and implementation of dependable distributed embedded systems. A large real-time applicatio...
Hermann Kopetz