Sciweavers

156 search results - page 12 / 32
» Insider Threat Analysis Using Information-Centric Modeling
Sort
View
ISW
2001
Springer
13 years 12 months ago
Suitability of a Classical Analysis Method for E-commerce Protocols
We present the adaptation of our model for the validation of key distribution and authentication protocols to address specific needs of protocols for electronic commerce. The two ...
Sigrid Gürgens, Javier Lopez
CSFW
2011
IEEE
12 years 7 months ago
Formal Analysis of Protocols Based on TPM State Registers
—We present a Horn-clause-based framework for analysing security protocols that use platform configuration registers (PCRs), which are registers for maintaining state inside the...
Stéphanie Delaune, Steve Kremer, Mark Dermo...
WSC
1997
13 years 8 months ago
The Use of Simulation in Activity-Based Costing for Flexible Manufacturing Systems
A framework to design simulation models is described in order to perform activity-based costing for flexible manufacturing systems before actual manufacturing activities. For illu...
Soemon Takakuwa
GLOBECOM
2008
IEEE
14 years 1 months ago
Intra-Vehicle UWB Channel Measurements and Statistical Analysis
—Ultra-wideband (UWB) technique attracts attention from automotive manufacturers as a potential way to construct intra-vehicle wireless sensor network. This paper reports our pre...
Weihong Niu, Jia Li, Timothy Talty
WSC
2001
13 years 8 months ago
Case study in modeling and simulation validation methodology
The military develops simulations to analyze nearly every aspect of defense. How accurate are these simulations and to what extent do they produce dependable results? Most guidanc...
Scott D. Simpkins, Eugene P. Paulo, Lyn R. Whitake...