Sciweavers

2270 search results - page 97 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
TIT
2008
84views more  TIT 2008»
15 years 3 months ago
Information Theoretic Bounds on Authentication Systems in Query Model
Authentication codes provide message integrity guarantees in an information theoretic sense within a symmetric key setting. Information theoretic bounds on the success probability...
Reihaneh Safavi-Naini, Peter R. Wild
129
Voted
IVC
2008
106views more  IVC 2008»
15 years 3 months ago
Attention links sensing to recognition
This paper presents arguments that explicit strategies for visual attentional selection are important for cognitive vision systems, and shows that a number of proposals currently ...
Albert L. Rothenstein, John K. Tsotsos
126
Voted
SEC
2003
15 years 4 months ago
World Framework for Security Benchmark Changes
: The paper contains presentation of a framework, which would significantly increase quality of information security products and procedures, and Commentary on difficulties of impl...
Lech J. Janczewski, Andrew M. Colarik
182
Voted
FOSAD
2009
Springer
15 years 10 months ago
The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols
We introduce the Open-source Fixed-point Model Checker OFMC for symbolic security protocol analysis, which extends the Onthe-fly Model Checker (the previous OFMC). The native inpu...
Sebastian Mödersheim, Luca Viganò
SP
2007
IEEE
137views Security Privacy» more  SP 2007»
15 years 9 months ago
A Cryptographic Decentralized Label Model
Information-flow security policies are an appealing way of specifying confidentiality and integrity policies in information systems. Most previous work on language-based securit...
Jeffrey A. Vaughan, Steve Zdancewic