Sciweavers

285 search results - page 46 / 57
» Computationally Sound, Automated Proofs for Security Protoco...
Sort
View
IPPS
1999
IEEE
13 years 12 months ago
An Approach for Measuring IP Security Performance in a Distributed Environment
Abstract. The Navy needs to use Multi Level Security (MLS) techniques in an environment with increasing amount of real time computation brought about by increased automation requir...
Brett L. Chappell, David T. Marlow, Philip M. Irey...
KBSE
2007
IEEE
14 years 1 months ago
Tools for model-based security engineering: models vs. code
We present tools to support model-based security engineering on both the model and the code level. In the approach supported by these tools, one firstly specifies the securitycr...
Jan Jürjens, Yijun Yu
SAC
2004
ACM
14 years 1 months ago
Protected transmission of biometric user authentication data for oncard-matching
Since fingerprint data are no secrets but of public nature, the verification data transmitted to a smartcard for oncardmatching need protection by appropriate means in order to ...
Ulrich Waldmann, Dirk Scheuermann, Claudia Eckert
MOBIHOC
2008
ACM
14 years 7 months ago
Self-monitoring for sensor networks
Local monitoring is an effective mechanism for the security of wireless sensor networks (WSNs). Existing schemes assume the existence of sufficient number of active nodes to carry...
Dezun Dong, Yunhao Liu, Xiangke Liao
CSL
2010
Springer
13 years 8 months ago
Quantified Differential Dynamic Logic for Distributed Hybrid Systems
Abstract. We address a fundamental mismatch between the combinations of dynamics that occur in complex physical systems and the limited kinds of dynamics supported in analysis. Mod...
André Platzer