Sciweavers

525 search results - page 20 / 105
» Using Checkable Types in Automatic Protocol Analysis
Sort
View
130
Voted
CSFW
2009
IEEE
15 years 6 months ago
Using ProVerif to Analyze Protocols with Diffie-Hellman Exponentiation
ProVerif is one of the most successful tools for cryptographic protocol analysis. However, dealing with algebraic properties of operators such as the exclusive OR (XOR) and Diffie-...
Ralf Küsters, Tomasz Truderung
143
Voted
DSOM
2006
Springer
15 years 5 months ago
Using Argumentation Logic for Firewall Policy Specification and Analysis
Firewalls are important perimeter security mechanisms that imple-ment an organisation's network security requirements and can be notoriously difficult to configure correctly. ...
Arosha K. Bandara, Antonis C. Kakas, Emil C. Lupu,...
94
Voted
CARDIS
2000
Springer
110views Hardware» more  CARDIS 2000»
15 years 6 months ago
Biometrics, Access Control, Smart Cards: A not so Simple Combination
Although biometrics can be an useful component for access control, the security they procure is often overestimated, as if they were a magic tool whose simple use will automatical...
Gaël Hachez, François Koeune, Jean-Jac...
91
Voted
ICSE
2007
IEEE-ACM
16 years 2 months ago
Path-Sensitive Inference of Function Precedence Protocols
Function precedence protocols define ordering relations among function calls in a program. In some instances, precedence protocols are well-understood (e.g., a call to pthread mut...
Murali Krishna Ramanathan, Ananth Grama, Suresh Ja...
116
Voted
ICDAR
2003
IEEE
15 years 7 months ago
Engineering Drawings Recognition Using a Case-based Approach
In this paper, we propose a framework for engineering drawings recognition using a case-based approach. The key idea of our scheme is that, interactively, the user provides an exa...
Yan Luo, Liu Wenyin