Sciweavers

6137 search results - page 121 / 1228
» Securing Collaborative Applications
Sort
View
COMCOM
2000
97views more  COMCOM 2000»
13 years 8 months ago
Verification of security protocols using LOTOS-method and application
We explain how the formal language LOTOS can be used to specify security protocols and cryptographic operations. We describe how security properties can be modelled as safety prop...
Guy Leduc, François Germeau
KBSE
2008
IEEE
14 years 3 months ago
Mashups and modularity: Towards secure and reusable web applications
The software industry is currently experiencing a paradigm shift towards web-based software. We argue that web technologies should evolve in a direction that would allow the devel...
Antero Taivalsaari, Tommi Mikkonen
VTC
2007
IEEE
150views Communications» more  VTC 2007»
14 years 3 months ago
Antenna Advancement Techniques and Integration of RFID Electronics on Organic Substrates for UHF RFID Applications in Automotive
— In this paper, design requirements and advanced approaches for improved performance UHF radio frequency identification (RFID) tags are presented. Organic substrates are examine...
Li Yang, Amin Rida, Jiexin Li, Manos M. Tentzeris
AAAI
2012
11 years 11 months ago
Computing Game-Theoretic Solutions and Applications to Security
The multiagent systems community has adopted game theory as a framework for the design of systems of multiple self-interested agents. For this to be effective, efficient algorith...
Vincent Conitzer
SP
2009
IEEE
155views Security Privacy» more  SP 2009»
14 years 3 months ago
A Logic of Secure Systems and its Application to Trusted Computing
We present a logic for reasoning about properties of secure systems. The logic is built around a concurrent programming language with constructs for modeling machines with shared ...
Anupam Datta, Jason Franklin, Deepak Garg, Dilsun ...