Sciweavers

985 search results - page 105 / 197
» On the validity of digital signatures
Sort
View
INFOCOM
2006
IEEE
14 years 4 months ago
A Quasi-Species Approach for Modeling the Dynamics of Polymorphic Worms
— Polymorphic worms can change their byte sequence as they replicate and propagate, thwarting the traditional signature analysis techniques used by many intrusion detection syste...
Bradley Stephenson, Biplab Sikdar
SP
2006
IEEE
147views Security Privacy» more  SP 2006»
14 years 4 months ago
A Computationally Sound Mechanized Prover for Security Protocols
We present a new mechanized prover for secrecy properties of security protocols. In contrast to most previous provers, our tool does not rely on the Dolev-Yao model, but on the co...
Bruno Blanchet
FROCOS
2005
Springer
14 years 3 months ago
Connecting Many-Sorted Structures and Theories Through Adjoint Functions
In a previous paper, we have introduced a general approach for connecting two many-sorted theories through connection functions that behave like homomorphisms on the shared signatu...
Franz Baader, Silvio Ghilardi
ITC
2000
IEEE
68views Hardware» more  ITC 2000»
14 years 2 months ago
Current ratios: a self-scaling technique for production IDDQ testing
The use of a single pass/fail threshold for IDDQ testing is unworkable as chip background currents increase to the point where they exceed many defect currents. This paper describ...
Peter C. Maxwell, Pete O'Neill, Robert C. Aitken, ...
ICPR
2010
IEEE
14 years 16 days ago
Using Spatial Relations for Graphical Symbol Description
—In this paper, we address the use of unified spatial relations for symbol description. We present a topologically guided directional relation signature. It references a unique ...
Santosh K. C., Laurent Wendling, Bart Lamiroy