Sciweavers

2705 search results - page 223 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
125
Voted
CSFW
1993
IEEE
15 years 6 months ago
Abstract Machines for Communication Security
Machines for Communication Security Pierre Bieber, Nora Boulahia-Cuppens Thomas Lehmann, Erich van Wickeren ONERA-CERT CAP debis GEI 2 Av. E. Belin Oxfordstr. 12-16 F-31055, Toulou...
Pierre Bieber, Nora Boulahia-Cuppens, T. Lehmann, ...
121
Voted
CCS
2005
ACM
15 years 8 months ago
Deciding security of protocols against off-line guessing attacks
We provide an effective procedure for deciding the existence of off-line guessing attacks on security protocols, for a bounded number of sessions. The procedure consists of a co...
Mathieu Baudet
ACSAC
2002
IEEE
15 years 7 months ago
Networking in The Solar Trust Model: Determining Optimal Trust Paths in a Decentralized Trust Network
The Solar Trust Model provides a method by which the sender of a message can be authenticated, and the level of trust that can be placed in the sender of the message or the messag...
Michael Clifford
113
Voted
WWW
2004
ACM
16 years 3 months ago
Visual web mining
Analysis of web site usage data involves two significant challenges: firstly the volume of data, arising from the growth of the web, and secondly, the structural complexity of web...
Amir H. Youssefi, David J. Duke, Mohammed Javeed Z...
IJCNN
2006
IEEE
15 years 8 months ago
Nominal-scale Evolving Connectionist Systems
— A method is presented for extending the Evolving Connectionist System (ECoS) algorithm that allows it to explicitly represent and learn nominal-scale data without the need for ...
Michael J. Watts