Sciweavers

920 search results - page 98 / 184
» Selecting Secure Passwords
Sort
View
ER
1998
Springer
147views Database» more  ER 1998»
14 years 1 months ago
An Active Conceptual Model for Fixed Income Securities Analysis for Multiple Financial Institutions
The practical implementation and use of a mediator for fixed income securities analysis demonstrated the potential for extending the application of conceptual modeling from the sys...
Allen Moulton, Stéphane Bressan, Stuart E. ...
ESWA
2008
155views more  ESWA 2008»
13 years 9 months ago
Using GHSOM to construct legal maps for Taiwan's securities and futures markets
A good legal knowledge representation system, capable of effectively providing investors with comprehensive legal knowledge, is needed for investors to prevent erratic behavior be...
Jen-Ying Shih, Yu-Jung Chang, Wun-Hwa Chen
IEEEHPCS
2010
13 years 8 months ago
Semantic model checking security requirements for web services
Model checking is a formal verification method widely accepted in the web service world because of its capability to reason about service behaviors, at their process-level. It ha...
L. Boaro, E. Glorio, Francesco Pagliarecci, Luca S...
CORR
2010
Springer
114views Education» more  CORR 2010»
13 years 4 months ago
Secure Communication over Parallel Relay Channel
We investigate the problem of secure communication over parallel relay channel in the presence of a passive eavesdropper. We consider a four terminal relay-eavesdropper channel wh...
Zohaib Hassan Awan, Abdellatif Zaidi, Luc Vandendo...
IACR
2011
97views more  IACR 2011»
12 years 9 months ago
Two-Output Secure Computation with Malicious Adversaries
We present a method to compile Yao’s two-player garbled circuit protocol into one that is secure against malicious adversaries that relies on witness indistinguishability. Our ap...
Abhi Shelat, Chih-Hao Shen