Sciweavers

1352 search results - page 82 / 271
» Designing Security Requirements Models Through Planning
Sort
View
ASIACRYPT
2008
Springer
15 years 5 months ago
A Modular Security Analysis of the TLS Handshake Protocol
We study the security of the widely deployed Secure Session Layer/Transport Layer Security (TLS) key agreement protocol. Our analysis identifies, justifies, and exploits the modul...
Paul Morrissey, Nigel P. Smart, Bogdan Warinschi
119
Voted
DAC
2009
ACM
15 years 10 months ago
Information hiding for trusted system design
For a computing system to be trusted, it is equally important to verify that the system performs no more and no less functionalities than desired. Traditional testing and verifica...
Junjun Gu, Gang Qu, Qiang Zhou
121
Voted
ITS
2000
Springer
112views Multimedia» more  ITS 2000»
15 years 7 months ago
Model of an Adaptive Support Interface for Distance Learning
We developed a distributed support model in an interface for distant learning. The support is integrated into the ExploraGraph navigator which makes it possible to navigate through...
Aude Dufresne
MSWIM
2004
ACM
15 years 8 months ago
Other-cell-interference factor distribution model in downlink WCDMA systems
– Interference performance is among the most important issues especially in WCDMA cellular networks planning coverage and capacity. F-factor has been introduced in previous works...
Anis Masmoudi, Sami Tabbane
147
Voted
SEC
1996
15 years 4 months ago
Intention modelling: approximating computer user intentions for detection and prediction of intrusions
This paper introduces and describes an innovative modelling approach which utilises models that are synthesised through approximate calculations of user actions and extensive repr...
Thomas Spyrou, John Darzentas