Sciweavers

255 search results - page 21 / 51
» Principles for Entity Authentication
Sort
View
IJNSEC
2007
121views more  IJNSEC 2007»
13 years 7 months ago
Injecting Heterogeneity Through Protocol Randomization
In this paper, we argue that heterogeneity should be an important principle in design and use of cryptographic protocols. We use automated formal analysis tools to randomly genera...
Li Zhuang, J. D. Tygar, Rachna Dhamija
IWPC
2008
IEEE
14 years 1 months ago
Assessing Software Archives with Evolutionary Clusters
The way in which a system’s software archive is partitioned influences the evolvability of that system. The partition of a software archive is mostly assessed by looking at the...
Adam Vanya, Lennart Holland, A. Steven Klusener, P...
LREC
2010
177views Education» more  LREC 2010»
13 years 8 months ago
Maskkot - An Entity-centric Annotation Platform
The Semantic Web is facing the important challenge to maintain its promise of a real world-wide graph of interconnected resources. Unfortunately, while URIs almost guarantee a dir...
Armando Stellato, Heiko Stoermer, Stefano Bortoli,...
RECSYS
2010
ACM
13 years 7 months ago
Interactive recommendations in social endorsement networks
An increasing number of social networking platforms are giving users the option to endorse entities that they find appealing, such as videos, photos, or even other users. We defin...
Theodoros Lappas, Dimitrios Gunopulos
DCC
2008
IEEE
14 years 7 months ago
Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS
LaMacchia, Lauter and Mityagin recently presented a strong security definition for authenticated key agreement strengthening the well-known Canetti-Krawczyk definition. They also ...
Berkant Ustaoglu