Sciweavers

12637 search results - page 126 / 2528
» Security for Extensible Systems
Sort
View
120
Voted
CDC
2010
IEEE
136views Control Systems» more  CDC 2010»
14 years 9 months ago
Multi-resolution path planning: Theoretical analysis, efficient implementation, and extensions to dynamic environments
A multi-resolution path planning algorithm based on the wavelet transform of the environment has been reported previously in the literature. In this paper, we provide a proof of co...
Raghvendra V. Cowlagi, Panagiotis Tsiotras
ASWEC
2005
IEEE
15 years 8 months ago
Deriving Systems Level Security Properties of Component Based Composite Systems
This paper proposes an approach of defining systemslevel security properties of component-based composite systems. It argues that the security properties of a composite system ca...
Khaled M. Khan, Jun Han
103
Voted
ATAL
2007
Springer
15 years 6 months ago
Towards provably secure trust and reputation systems in e-marketplaces
In this paper, we present a framework for evaluating the security of trust and reputation systems for electronic marketplaces populated with buying and selling agents. Our propose...
Reid Kerr, Robin Cohen
CCS
2010
ACM
14 years 11 months ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...
131
Voted
AGENTS
2000
Springer
15 years 7 months ago
SIAS: a secure shopping information agent system
In this paper, we build a Shopping Information Agent System (SIAS) based on mobile agent technology. We discuss possible security attacks by malicious hosts to agents in the syste...
Anthony H. W. Chan, Tsz Yeung Wong, Caris K. M. Wo...