Sciweavers

1106 search results - page 164 / 222
» Automated Design of Security Protocols
Sort
View
HICSS
2005
IEEE
188views Biometrics» more  HICSS 2005»
14 years 4 months ago
Developing Group Decision Support Systems for Deception Detection
Achieving information assurance and security is a complex and challenging task, which is crucial from national and personal security point of views. Research in detecting deceptiv...
Amit V. Deokar, Therani Madhusudan
FLOPS
2006
Springer
14 years 2 months ago
Soutei, a Logic-Based Trust-Management System
We describe the design and implementation of a trust-management system Soutei, a dialect of Binder, for access control in distributed systems. Soutei policies and credentials are w...
Andrew Pimlott, Oleg Kiselyov
DAC
2008
ACM
14 years 28 days ago
Protecting bus-based hardware IP by secret sharing
Our work addresses protection of hardware IP at the mask level with the goal of preventing unauthorized manufacturing. The proposed protocol based on chip locking and activation i...
Jarrod A. Roy, Farinaz Koushanfar, Igor L. Markov
JCIT
2007
142views more  JCIT 2007»
13 years 11 months ago
Distributed Certification Authority for Mobile Ad Hoc Networks - A Dynamic Approach
A Mobile Ad Hoc Network (MANET) is an infrastructureless network of wireless mobile nodes that cooperate among each other to maintain connectivity of the network. In comparison to...
Sanjay Raghani, Durga Toshniwal
EUROSYS
2007
ACM
14 years 8 months ago
Melange: creating a "functional" internet
Most implementations of critical Internet protocols are written in type-unsafe languages such as C or C++ and are regularly vulnerable to serious security and reliability problems...
Anil Madhavapeddy, Alex Ho, Tim Deegan, David Scot...