Sciweavers

1825 search results - page 310 / 365
» Cryptographic Securities Exchanges
Sort
View
ATVA
2006
Springer
160views Hardware» more  ATVA 2006»
14 years 14 days ago
Monotonic Set-Extended Prefix Rewriting and Verification of Recursive Ping-Pong Protocols
Ping-pong protocols with recursive definitions of agents, but without any active intruder, are a Turing powerful model. We show that under the environment sensitive semantics (i.e....
Giorgio Delzanno, Javier Esparza, Jirí Srba
SEC
2007
13 years 10 months ago
Trust Evaluation for Web Applications based on Behavioral Analysis
This paper deals with a joint use of a trust evaluation approach and access control mechanisms for improving security in Web-usage. Trust evaluation is achieved by means of both be...
Luiz Fernando Rust C. Carmo, Breno G. de Oliveira,...
NETWORKING
2004
13 years 10 months ago
Performance Modelling and Evaluation of Firewall Architectures for Multimedia Applications
Firewalls are a well-established security mechanism to restrict the traffic exchanged between networks to a certain subset of users and applications. In order to cope with new appl...
Utz Roedig, Jens Schmitt
IADIS
2003
13 years 10 months ago
Moda-Ml, an Interoperability Framework for the Textile-Clothing Sector
The MODA-ML project aims to enhance the interoperability between enterprises in the Textile/Clothing sector defining a common interchange language based on a set of XML business c...
Nicola Gessa, Fabio Vitali, Guido Cucchiara, Piero...
DCC
2000
IEEE
13 years 8 months ago
Discrete Logarithms: The Past and the Future
The first practical public key cryptosystem to be published, the Diffie-Hellman key exchange algorithm, was based on the assumption that discrete logarithms are hard to compute. T...
Andrew M. Odlyzko