Sciweavers

503 search results - page 31 / 101
» Authenticity by tagging and typing
Sort
View
CTRSA
2006
Springer
140views Cryptology» more  CTRSA 2006»
14 years 17 days ago
Session Corruption Attack and Improvements on Encryption Based MT-Authenticators
Bellare, Canetti and Krawczyk proposed a security model (BCK-model) for authentication and key exchange protocols in 1998. The model not only reasonably captures the power of pract...
Xiaojian Tian, Duncan S. Wong
BMCBI
2006
97views more  BMCBI 2006»
13 years 9 months ago
A comparative analysis of the information content in long and short SAGE libraries
Background: Serial Analysis of Gene Expression (SAGE) is a powerful tool to determine gene expression profiles. Two types of SAGE libraries, ShortSAGE and LongSAGE, are classified...
Yi-Ju Li, Puting Xu, Xuejun Qin, Donald E. Schmech...
ACSAC
2003
IEEE
14 years 2 months ago
Behavioral Authentication of Server Flows
Understanding the nature of the information flowing into and out of a system or network is fundamental to determining if there is adherence to a usage policy. Traditional methods...
James P. Early, Carla E. Brodley, Catherine Rosenb...
CCS
2003
ACM
14 years 16 days ago
LEAP: efficient security mechanisms for large-scale distributed sensor networks
We describe LEAP (Localized Encryption and Authentication Protocol), a key management protocol for sensor networks that is designed to support in-network processing, while at the ...
Sencun Zhu, Sanjeev Setia, Sushil Jajodia
JUCS
2008
115views more  JUCS 2008»
13 years 8 months ago
An Implementation of CLIM Presentation Types
: Presentation types are used in the CLIM interface library to tag graphical output with a type and establish an input type context in which the user may use the keyboard to type i...
Timothy Moore