Sciweavers

222 search results - page 20 / 45
» Secure Content Delivery using Key Composition
Sort
View
FSTTCS
2009
Springer
14 years 2 months ago
Simulation based security in the applied pi calculus
We present a symbolic framework for refinement and composition of security protocols. ework uses the notion of ideal functionalities. These are abstract systems which are secure b...
Stéphanie Delaune, Steve Kremer, Olivier Pe...
JUCS
2010
155views more  JUCS 2010»
13 years 2 months ago
Authoring and Delivering Personalised Simulations - an Innovative Approach to Adaptive eLearning for Soft Skills
: This paper examines the personalization of online training simulations which are a key modern approach in computer aided education. More specifically it focuses on the difficulti...
Conor Gaffney, Declan Dagger, Vincent Wade
COLCOM
2008
IEEE
13 years 9 months ago
Mashup Model and Verification Using Mashup Processing Network
Abstract. Mashups are defined to be lightweight Web applications aggregating data from different Web services, built using ad-hoc composition and being not concerned with long term...
Ehtesham Zahoor, Olivier Perrin, Claude Godart
ICMCS
2007
IEEE
175views Multimedia» more  ICMCS 2007»
14 years 1 months ago
Clicker - An IPTV Remote Control in Your Cell Phone
This paper investigates a novel concept of providing seamless control and portability of an IPTV viewing session. A solution employing a middleware system, a secure hardware token...
Rittwik Jana, Yih-Farn Chen, David C. Gibbon, Yenn...
ASIAN
2006
Springer
116views Algorithms» more  ASIAN 2006»
13 years 11 months ago
Secrecy Analysis in Protocol Composition Logic
We present formal proof rules for inductive reasoning about the way that data transmitted on the network remains secret from a malicious attacker. Extending a compositional protoco...
Arnab Roy, Anupam Datta, Ante Derek, John C. Mitch...