Sciweavers

1106 search results - page 71 / 222
» Automated Design of Security Protocols
Sort
View
CCS
1993
ACM
14 years 2 months ago
NetCash: A Design for Practical Electronic Currency on the Internet
NetCash is a framework that supports realtime electronic payments with provision of anonymity over an unsecure network. It is designed to enable new types of services on the Inter...
Gennady Medvinsky, B. Clifford Neuman
ACSAC
2000
IEEE
14 years 2 months ago
Security Agility in Response to Intrusion Detection
Cooperative frameworks for intrusion detection and response exemplify a key area of today’s computer research: automating defenses against malicious attacks that increasingly ar...
M. Petkac, Lee Badger
DATE
2005
IEEE
164views Hardware» more  DATE 2005»
14 years 3 months ago
Automated Synthesis of Assertion Monitors using Visual Specifications
Automated synthesis of monitors from high-level properties plays a significant role in assertion-based verification. We present here a methodology to synthesize assertion monitors...
Ambar A. Gadkari, S. Ramesh
HOLOMAS
2003
Springer
14 years 3 months ago
Integration of Automation Resources in Holonic Manufacturing Applications
Holonic and agent-based paradigms are very suitable in the development of distributed manufacturing control systems, taking advantage of their modularity, decentralization, and abi...
Paulo Leitão, Raymond Boissier, Francisco C...
ACNS
2010
Springer
159views Cryptology» more  ACNS 2010»
14 years 2 months ago
A Message Recognition Protocol Based on Standard Assumptions
We look at the problem of designing Message Recognition Protocols (MRP) and note that all proposals available in the literature have relied on security proofs which hold in the ran...
Atefeh Mashatan, Serge Vaudenay