Sciweavers

2209 search results - page 100 / 442
» Language Based Secure Communication
Sort
View
176
Voted
SCN
2011
Springer
292views Communications» more  SCN 2011»
14 years 9 months ago
Synthesis of attack actions using model checking for the verification of security protocols
Model checking cryptographic protocols have evolved to a valuable method for discovering counterintuitive security flaws, which make possible for a hostile agent to subvert the go...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
109
Voted
ECAI
2000
Springer
15 years 7 months ago
The Emergence of Grammar in Communicating Autonomous Robotic Agents
Abstract. Over the past five years, the topic of the origins of language is gaining prominence as one of the big unresolved questions of cognitive science. Artificial Intelligenc...
Luc Steels
127
Voted
ESORICS
2009
Springer
15 years 9 months ago
A Spatial Cloaking Framework Based on Range Search for Nearest Neighbor Search
For nearest neighbor search, a user queries a server for nearby points of interest (POIs) with his/her location information. Our aim is to protect the user’s sensitive informatio...
Hyoungshick Kim
120
Voted
ISCC
2000
IEEE
15 years 7 months ago
Light Weight Security for Parallel Access to Multiple Mirror Sites
Mirror sites approach has been proposed recently for reducing the access delay and providing load balancing in network servers. In the mirror site approach a file, such as a multi...
Bülent Yener
90
Voted
ICDCS
2008
IEEE
15 years 9 months ago
Securing Wireless Data Networks against Eavesdropping using Smart Antennas
In this paper, we focus on securing communication over wireless data networks from malicious eavesdroppers, using smart antennas. While conventional cryptography based approaches ...
Sriram Lakshmanan, Cheng-Lin Tsao, Raghupathy Siva...