Sciweavers

3821 search results - page 251 / 765
» A Security Model for Aglets
Sort
View
SCN
2010
Springer
232views Communications» more  SCN 2010»
13 years 7 months ago
Authenticated Key Agreement with Key Re-use in the Short Authenticated Strings Model
Serge Vaudenay [20] introduced a notion of Message Authentication (MA) protocols in the Short Authenticated String (SAS) model. A SAS-MA protocol authenticates arbitrarily long mes...
Stanislaw Jarecki, Nitesh Saxena
DBSEC
2010
196views Database» more  DBSEC 2010»
13 years 6 months ago
Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance
Abstract. This paper describes how to preserve integrity and confidentiality of a directed acyclic graph (DAG) model of provenance database. We show a method to preserve integrity ...
Amril Syalim, Takashi Nishide, Kouichi Sakurai
ESWA
2011
220views Database» more  ESWA 2011»
13 years 1 months ago
Unsupervised neural models for country and political risk analysis
This interdisciplinary research project focuses on relevant applications of Knowledge Discovery and Artificial Neural Networks in order to identify and analyse levels of country, b...
Álvaro Herrero, Emilio Corchado, Alfredo Ji...
ACNS
2009
Springer
168views Cryptology» more  ACNS 2009»
14 years 4 months ago
Session-state Reveal Is Stronger Than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange Protocol
Abstract. In the paper “Stronger Security of Authenticated Key Exchange” [1,2], a new security model for authenticated key exchange protocols (eCK) is proposed. The new model i...
Cas J. F. Cremers
IHI
2012
266views Healthcare» more  IHI 2012»
12 years 5 months ago
A software tool for large-scale sharing and querying of clinical documents modeled using HL7 version 3 standard
We present a novel software tool called CDN (Collaborative Data Network) for large-scale sharing and querying of clinical documents modeled using HL7 v3 standard (e.g., Clinical D...
Praveen R. Rao, Tivakar Komara Swami, Deepthi S. R...