Sciweavers

161 search results - page 6 / 33
» Combining Algorithms for Deciding Knowledge in Security Prot...
Sort
View
TOCL
2008
128views more  TOCL 2008»
13 years 8 months ago
A comprehensive combination framework
fragment enjoys suitable noetherianity conditions and admits an abstract version of a `KeislerShelah like' isomorphism theorem. We show that this general decidability transfer...
Silvio Ghilardi, Enrica Nicolini, Daniele Zucchell...
CORR
2006
Springer
104views Education» more  CORR 2006»
13 years 8 months ago
Modeling Adversaries in a Logic for Security Protocol Analysis
Logics for security protocol analysis require the formalization of an adversary model that specifies the capabilities of adversaries. A common model is the Dolev-Yao model, which c...
Joseph Y. Halpern, Riccardo Pucella
ATVA
2006
Springer
160views Hardware» more  ATVA 2006»
14 years 9 days ago
Monotonic Set-Extended Prefix Rewriting and Verification of Recursive Ping-Pong Protocols
Ping-pong protocols with recursive definitions of agents, but without any active intruder, are a Turing powerful model. We show that under the environment sensitive semantics (i.e....
Giorgio Delzanno, Javier Esparza, Jirí Srba
FROCOS
2007
Springer
14 years 2 months ago
Towards an Automatic Analysis of Web Service Security
Web services send and receive messages in XML syntax with some parts hashed, encrypted or signed, according to the WS-Security standard. In this paper we introduce a model to forma...
Yannick Chevalier, Denis Lugiez, Michaël Rusi...
IEAAIE
2010
Springer
13 years 6 months ago
The Combination of a Causal and Emotional Learning Mechanism for an Improved Cognitive Tutoring Agent
This paper describes a Conscious Tutoring System (CTS) capable of dynamic fine-tuned assistance to users. We put forth the combination of a Causal Learning and Emotional learning m...
Usef Faghihi, Philippe Fournier-Viger, Roger Nkamb...