Sciweavers

1352 search results - page 82 / 271
» Designing Security Requirements Models Through Planning
Sort
View
ASIACRYPT
2008
Springer
13 years 11 months ago
A Modular Security Analysis of the TLS Handshake Protocol
We study the security of the widely deployed Secure Session Layer/Transport Layer Security (TLS) key agreement protocol. Our analysis identifies, justifies, and exploits the modul...
Paul Morrissey, Nigel P. Smart, Bogdan Warinschi
DAC
2009
ACM
14 years 3 months ago
Information hiding for trusted system design
For a computing system to be trusted, it is equally important to verify that the system performs no more and no less functionalities than desired. Traditional testing and verifica...
Junjun Gu, Gang Qu, Qiang Zhou
ITS
2000
Springer
112views Multimedia» more  ITS 2000»
14 years 15 days ago
Model of an Adaptive Support Interface for Distance Learning
We developed a distributed support model in an interface for distant learning. The support is integrated into the ExploraGraph navigator which makes it possible to navigate through...
Aude Dufresne
MSWIM
2004
ACM
14 years 2 months ago
Other-cell-interference factor distribution model in downlink WCDMA systems
– Interference performance is among the most important issues especially in WCDMA cellular networks planning coverage and capacity. F-factor has been introduced in previous works...
Anis Masmoudi, Sami Tabbane
SEC
1996
13 years 10 months ago
Intention modelling: approximating computer user intentions for detection and prediction of intrusions
This paper introduces and describes an innovative modelling approach which utilises models that are synthesised through approximate calculations of user actions and extensive repr...
Thomas Spyrou, John Darzentas