Machines for Communication Security Pierre Bieber, Nora Boulahia-Cuppens Thomas Lehmann, Erich van Wickeren ONERA-CERT CAP debis GEI 2 Av. E. Belin Oxfordstr. 12-16 F-31055, Toulou...
Pierre Bieber, Nora Boulahia-Cuppens, T. Lehmann, ...
We provide an effective procedure for deciding the existence of off-line guessing attacks on security protocols, for a bounded number of sessions. The procedure consists of a co...
The Solar Trust Model provides a method by which the sender of a message can be authenticated, and the level of trust that can be placed in the sender of the message or the messag...
Analysis of web site usage data involves two significant challenges: firstly the volume of data, arising from the growth of the web, and secondly, the structural complexity of web...
Amir H. Youssefi, David J. Duke, Mohammed Javeed Z...
— A method is presented for extending the Evolving Connectionist System (ECoS) algorithm that allows it to explicitly represent and learn nominal-scale data without the need for ...