Sciweavers

1490 search results - page 133 / 298
» The Logic of Authentication Protocols
Sort
View
DCOSS
2006
Springer
15 years 7 months ago
Distributed User Access Control in Sensor Networks
User access control in sensor networks defines a process of granting user the access right to the information and resources. It is essential for the future real sensor network depl...
Haodong Wang, Qun Li
ICASSP
2007
IEEE
15 years 10 months ago
Adaptive Weight Estimation in Multi-Biometric Verification using Fuzzy Logic Decision Fusion
This paper describes a multi-biometric verification system that is fully adaptive to variability in data acquisition using fuzzy logic decision fusion. The system uses fuzzy logic...
Henry Pak-Sum Hui, Helen M. Meng, Man-Wai Mak
CSFW
1999
IEEE
15 years 8 months ago
A Meta-Notation for Protocol Analysis
Most formal approaches to security protocol analysis are based on a set of assumptions commonly referred to as the "Dolev-Yao model." In this paper, we use a multiset re...
Iliano Cervesato, Nancy A. Durgin, Patrick Lincoln...
115
Voted
ISPEC
2007
Springer
15 years 10 months ago
An Economical Model for the Risk Evaluation of DoS Vulnerabilities in Cryptography Protocols
Denial of Service (DoS) attacks are a virulent type of attack on the availability of networks’ intended services and resources. Defense against DoS attacks has been built into th...
Zhen Cao, Zhi Guan, Zhong Chen, Jian-bin Hu, Liyon...
ATAL
2006
Springer
15 years 7 months ago
Performance analysis of untraceability protocols for mobile agents using an adaptable framework
Recently we had proposed two untraceability protocols for mobile agents and began investigating their quality. We believe that quality evaluation of security protocols should exte...
Rafal Leszczyna, Janusz Górski