Sciweavers

293 search results - page 28 / 59
» Formal Security Analysis with Interacting State Machines
Sort
View
LICS
1999
IEEE
13 years 12 months ago
Proving Security Protocols Correct
Security protocols use cryptography to set up private communication channels on an insecure network. Many protocols contain flaws, and because security goals are seldom specified ...
Lawrence C. Paulson
SC
2004
ACM
14 years 1 months ago
VMPlants: Providing and Managing Virtual Machine Execution Environments for Grid Computing
Virtual machines provide flexible, powerful execution environments for Grid computing, offering isolation and security mechanisms complementary to operating systems, customization...
Ivan Krsul, Arijit Ganguly, Jian Zhang, José...
IJNSEC
2008
98views more  IJNSEC 2008»
13 years 7 months ago
An Update on the Analysis and Design of NMAC and HMAC Functions
In this paper, we investigate the issues in the analysis and design of provably secure message authentication codes (MACs) Nested MAC (NMAC) and Hash based MAC (HMAC) proposed by ...
Praveen Gauravaram, Shoichi Hirose, Suganya Annadu...
ISI
2004
Springer
14 years 1 months ago
Interactive Query Languages for Intelligence Tasks
Counterterrorism and intelligence tasks rely on the efficient collection, analysis and dissemination of information. While information systems play a key role in such tasks, databa...
Antonio Badia
HICSS
2006
IEEE
144views Biometrics» more  HICSS 2006»
14 years 1 months ago
The Choreography Model for IRS-III
This paper describes how we manage the interaction between different heterogeneous web services through choreographies within IRS-III. IRS-III is a framework and platform for deve...
John Domingue, Stefania Galizia, Liliana Cabral