Sciweavers

2081 search results - page 135 / 417
» Chaotic Systems Synchronization in Secure Communication Syst...
Sort
View
ASIAN
1999
Springer
118views Algorithms» more  ASIAN 1999»
14 years 22 days ago
Asynchronous Links in the PBC and M-Nets
This paper aims at introducing an extension of M-nets, a fully compositional class of high-level Petri nets, and of its low-level counter part, Petri Boxes Calculus (PBC). We intro...
Hanna Klaudel, Franck Pommereau
ICICS
2001
Springer
14 years 27 days ago
Enforcing Obligation with Security Monitors
With the ubiquitous deployment of large scale networks more and more complex human interactions are supported by computer applications. This poses new challenges on the expressive...
Carlos Ribeiro, Andre Zuquete, Paulo Ferreira
WWW
2008
ACM
14 years 9 months ago
Secure or insure?: a game-theoretic analysis of information security games
Despite general awareness of the importance of keeping one's system secure, and widespread availability of consumer security technologies, actual investment in security remai...
Jens Grossklags, Nicolas Christin, John Chuang
HICSS
2007
IEEE
85views Biometrics» more  HICSS 2007»
14 years 2 months ago
Leveraging Computational Grid Technologies for Building a Secure and Manageable Power Grid
The US Power Industry is in the process of overhauling the Power Grid to make it more secure, reliable, and available. The IT systems that comprise a major part of this change nee...
Himanshu Khurana, Mohammad Maifi Hasan Khan, Von W...
GLOBECOM
2006
IEEE
14 years 2 months ago
A Lightweight Secure Solution for RFID
— Radio Frequency Identification (RFID) systems have provided promising solutions to effective identification of a large number of tagged objects. However, RFID systems suffer ...
Bo Sun, Chung-Chih Li, Yang Xiao