Sciweavers

1288 search results - page 97 / 258
» Securing aspect composition
Sort
View
ICCV
2011
IEEE
12 years 10 months ago
Delta-Dual Hierarchical Dirichlet Processes: A pragmatic abnormal behaviour detector
In the security domain a key problem is identifying rare behaviours of interest. Training examples for these behaviours may or may not exist, and if they do exist there will be fe...
Tom Haines, Queen Mary, Tao Xiang
TCC
2009
Springer
133views Cryptology» more  TCC 2009»
14 years 10 months ago
Composing Quantum Protocols in a Classical Environment
We propose a general security definition for cryptographic quantum protocols that implement classical non-reactive two-party tasks. The definition is expressed in terms of simple q...
Serge Fehr, Christian Schaffner
ACISP
2005
Springer
14 years 3 months ago
Traversing Middleboxes with the Host Identity Protocol
The limited flexibility of the Internet to support mobility has motivated many researchers to look for alternative architectures. One such effort that combines security and multi...
Hannes Tschofenig, Andrei Gurtov, Jukka Ylitalo, A...
CRYPTO
2005
Springer
137views Cryptology» more  CRYPTO 2005»
14 years 3 months ago
A Formal Treatment of Onion Routing
Anonymous channels are necessary for a multitude of privacy-protecting protocols. Onion routing is probably the best known way to achieve anonymity in practice. However, the crypto...
Jan Camenisch, Anna Lysyanskaya
OTM
2007
Springer
14 years 4 months ago
Bayesian Analysis of Secure P2P Sharing Protocols
Ad hoc and peer-to-peer (P2P) computing paradigms pose a number of security challenges. The deployment of classic security protocols to provide services such as node authentication...
Esther Palomar, Almudena Alcaide, Juan M. Est&eacu...