Sciweavers

1490 search results - page 146 / 298
» The Logic of Authentication Protocols
Sort
View
ATAL
2004
Springer
15 years 9 months ago
Preferences in Game Logics
We introduce a Game Logic with Preferences (GLP), which makes it possible to reason about how information or assumptions about the preferences of other players can be used by agen...
Sieuwert van Otterloo, Wiebe van der Hoek, Michael...
117
Voted
FUZZIEEE
2007
IEEE
15 years 10 months ago
Applying Fuzzy Logic for Decision-making on Wireless Sensor Networks
— We propose a fuzzy-based decision-making mechanism for selecting data dissemination protocols in wireless sensor networks (WSNs). Its goal is to select the most efficient proto...
Luci Pirmez, Flávia Coimbra Delicato, Paulo...
142
Voted
BIRTHDAY
2006
Springer
15 years 7 months ago
Reasoning About Web Services in a Temporal Action Logic
The paper presents an approach to reasoning about Web services in a temporal action theory. Web services are described by specifying their interaction protocols in an action theory...
Alberto Martelli, Laura Giordano
SP
2000
IEEE
15 years 7 months ago
Searching for a Solution: Engineering Tradeoffs and the Evolution of Provably Secure Protocols
Tradeoffs are an important part of engineering security. Protocol security is important. So are efficiency and cost. This paper provides an early framework for handling such aspec...
John A. Clark, Jeremy L. Jacob
ACSAC
2009
IEEE
15 years 10 months ago
Privacy through Noise: A Design Space for Private Identification
To protect privacy in large systems, users must be able to authenticate against a central server without disclosing their identity to the network. Private identification protocols ...
Karsten Nohl, David Evans