Sciweavers

161 search results - page 16 / 33
» Combining Algorithms for Deciding Knowledge in Security Prot...
Sort
View
JUCS
2007
88views more  JUCS 2007»
13 years 8 months ago
Internet Payment System: A New Payment System for Internet Transactions
: Payment systems need to address a number of security issues in order to be an effective and secure means of transferring payments across the Internet. To be accessible to a wider...
Zoran Djuric, Ognjen Maric, Dragan Gasevic
CORR
2010
Springer
155views Education» more  CORR 2010»
13 years 6 months ago
A Proof Theoretic Analysis of Intruder Theories
We consider the problem of intruder deduction in security protocol analysis: that is, deciding whether a given message M can be deduced from a set of messages under the theory of ...
Alwen Tiu, Rajeev Goré, Jeremy E. Dawson
ASIAN
2006
Springer
133views Algorithms» more  ASIAN 2006»
14 years 11 days ago
Normal Proofs in Intruder Theories
Given an arbitrary intruder deduction capability, modeled as an inference system S and a protocol, we show how to compute an inference system bS such that the security problem for ...
Vincent Bernat, Hubert Comon-Lundh
SENSYS
2003
ACM
14 years 1 months ago
Differentiated surveillance for sensor networks
For many sensor network applications such as military surveillance, it is necessary to provide full sensing coverage to a security-sensitive area while at the same time minimizing...
Ting Yan, Tian He, John A. Stankovic
ICIP
2003
IEEE
14 years 10 months ago
A comparative evaluation of global representation-based schemes for face verification
This paper is focused on algorithmic issues for biometric face verification (i.e., given an image of the face and an identity claim, decide whether they correspond to each other o...
Javier Ortega-Garcia, Joaquin Gonzalez-Rodriguez, ...