Sciweavers

2043 search results - page 92 / 409
» Reasoning About Security Models
Sort
View
ACISP
2007
Springer
14 years 4 months ago
TCHo: A Hardware-Oriented Trapdoor Cipher
This paper improves the Finiasz-Vaudenay construction of TCHo, a hardware-oriented public-key cryptosystem, whose security relies on the hardness of finding a low-weight multiple ...
Jean-Philippe Aumasson, Matthieu Finiasz, Willi Me...
FLAIRS
2003
14 years 19 hour ago
When Regions Start to Move
In this paper, we discuss a formalism for modeling regions that are exposed to movement or deformation. The basis of our formalism is the RCC theory, which uses topological relati...
Hans W. Guesgen
CCS
2006
ACM
14 years 2 months ago
Time series modeling for IDS alert management
Intrusion detection systems create large amounts of alerts. Significant part of these alerts can be seen as background noise of an operational information system, and its quantity...
Jouni Viinikka, Hervé Debar, Ludovic M&eacu...
IWPC
2009
IEEE
14 years 5 months ago
Practical static analysis for inference of security-related program properties
We present a static analysis framework for inference of security-related program properties. Within this framework we design and implement ownership, immutability and information ...
Yin Liu, Ana Milanova
AGENTS
2001
Springer
14 years 3 months ago
PHOSPHORUS: a task-based agent matchmaker
PHOSPHORUS is an agent matchmaking service that exploits domain ontologies, description logic, and a highly declarative language to reason about task-related agent capabilities. P...
Yolanda Gil, Surya Ramachandran