Sciweavers

577 search results - page 38 / 116
» Engineering Sufficiently Secure Computing
Sort
View
105
Voted
APSEC
2004
IEEE
15 years 6 months ago
Top-Down Approach Toward Building Ubiquitous Sensor Network Applications
Tiny networked sensor devices will be disseminated over our physical life space, and take a significant role in realizing a ubiquitous computing environment. As sensor network tec...
Yoshihiro Kawahara, Nao Kawanishi, Hiroyuki Morika...
FSTTCS
2005
Springer
15 years 8 months ago
Non-disclosure for Distributed Mobile Code
Abstract. This paper addresses the issue of confidentiality and declassification for global computing in a language-based security perspective. The purpose is to deal with new fo...
Ana Almeida Matos
136
Voted
CSE
2009
IEEE
15 years 9 months ago
Privacy-Preserving Multi-agent Constraint Satisfaction
—Constraint satisfaction has been a very successful paradigm for solving problems such as resource allocation and planning. Many of these problems pose themselves in a context in...
Thomas Léauté, Boi Faltings
156
Voted
ESORICS
2012
Springer
13 years 5 months ago
Dismantling iClass and iClass Elite
With more than 300 million cards sold, HID iClass is one of the most popular contactless smart cards on the market. It is widely used for access control, secure login and payment s...
Flavio D. Garcia, Gerhard de Koning Gans, Roel Ver...
122
Voted
ICDCS
2007
IEEE
15 years 9 months ago
Testing Security Properties of Protocol Implementations - a Machine Learning Based Approach
Security and reliability of network protocol implementations are essential for communication services. Most of the approaches for verifying security and reliability, such as forma...
Guoqiang Shu, David Lee