Sciweavers

1597 search results - page 236 / 320
» Mental Models of Computer Security
Sort
View
161
Voted
IANDC
2007
151views more  IANDC 2007»
15 years 4 months ago
Transducer-based analysis of cryptographic protocols
Cryptographic protocols can be divided into (1) protocols where the protocol steps are simple from a computational point of view and can thus be modeled by simple means, for insta...
Ralf Küsters, Thomas Wilke
JETAI
2007
141views more  JETAI 2007»
15 years 4 months ago
Exchange market for complex commodities: search for optimal matches
The Internet has led to the development of on-line markets, and computer scientists have designed various auction algorithms, as well as automated exchanges for standardized commo...
Eugene Fink, Jianli Gong, Josh Johnson
ISCI
2010
146views more  ISCI 2010»
15 years 1 months ago
Simulatable certificateless two-party authenticated key agreement protocol
Key agreement (KA) allows two or more users to negotiate a secret session key among them over an open network. Authenticated key agreement (AKA) is a KA protocol enhanced to preve...
Lei Zhang 0009, Futai Zhang, Qianhong Wu, Josep Do...
PLDI
2012
ACM
13 years 6 months ago
RockSalt: better, faster, stronger SFI for the x86
Software-based fault isolation (SFI), as used in Google’s Native Client (NaCl), relies upon a conceptually simple machine-code analysis to enforce a security policy. But for com...
Greg Morrisett, Gang Tan, Joseph Tassarotti, Jean-...
SKG
2006
IEEE
15 years 10 months ago
A Semantic-based Meteorology Grid Service Registry, Discovery and Composition Framework
Meteorology Grid Computing aims to provide scientist with seamless, reliable, secure and inexpensive access to meteorological resources. In this paper, we presented a semantic-bas...
Kaijun Ren, Nong Xiao, Junqiang Song, Weimin Zhang...