Sciweavers

46 search results - page 4 / 10
» Intruder Theories (Ongoing Work)
Sort
View
APAL
2010
114views more  APAL 2010»
13 years 6 months ago
Classical predicative logic-enriched type theories
A logic-enriched type theory (LTT) is a type theory extended with a primitive mechanism for forming and proving propositions. We construct two LTTs, named LTT0 and LTT 0, which we...
Robin Adams, Zhaohui Luo
AIEDAM
2008
92views more  AIEDAM 2008»
13 years 6 months ago
A review of function modeling: Approaches and applications
This work is aimed at establishing a common frame and understanding of function modeling (FM) for our ongoing research activities. A comparative review of the literature is perfor...
M. S. Erden, H. Komoto, T. J. van Beek, V. D'Ameli...
MOBICOM
2005
ACM
14 years 6 days ago
Barrier coverage with wireless sensors
In old times, castles were surrounded by moats (deep trenches filled with water, and even alligators) to thwart or discourage intrusion attempts. One can now replace such barrier...
Santosh Kumar, Ten-Hwang Lai, Anish Arora
MOBIHOC
2010
ACM
13 years 4 months ago
Barrier coverage with sensors of limited mobility
Barrier coverage is a critical issue in wireless sensor networks for various battlefield and homeland security applications. The goal is to effectively detect intruders that attem...
Anwar Saipulla, Benyuan Liu, Guoliang Xing, Xinwen...
CSFW
2009
IEEE
13 years 10 months ago
Using ProVerif to Analyze Protocols with Diffie-Hellman Exponentiation
ProVerif is one of the most successful tools for cryptographic protocol analysis. However, dealing with algebraic properties of operators such as the exclusive OR (XOR) and Diffie-...
Ralf Küsters, Tomasz Truderung