Sciweavers

12637 search results - page 126 / 2528
» Security for Extensible Systems
Sort
View
CDC
2010
IEEE
136views Control Systems» more  CDC 2010»
13 years 4 months ago
Multi-resolution path planning: Theoretical analysis, efficient implementation, and extensions to dynamic environments
A multi-resolution path planning algorithm based on the wavelet transform of the environment has been reported previously in the literature. In this paper, we provide a proof of co...
Raghvendra V. Cowlagi, Panagiotis Tsiotras
ASWEC
2005
IEEE
14 years 2 months ago
Deriving Systems Level Security Properties of Component Based Composite Systems
This paper proposes an approach of defining systemslevel security properties of component-based composite systems. It argues that the security properties of a composite system ca...
Khaled M. Khan, Jun Han
ATAL
2007
Springer
14 years 1 months ago
Towards provably secure trust and reputation systems in e-marketplaces
In this paper, we present a framework for evaluating the security of trust and reputation systems for electronic marketplaces populated with buying and selling agents. Our propose...
Reid Kerr, Robin Cohen
CCS
2010
ACM
13 years 5 months ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...
AGENTS
2000
Springer
14 years 1 months ago
SIAS: a secure shopping information agent system
In this paper, we build a Shopping Information Agent System (SIAS) based on mobile agent technology. We discuss possible security attacks by malicious hosts to agents in the syste...
Anthony H. W. Chan, Tsz Yeung Wong, Caris K. M. Wo...