Sciweavers

1737 search results - page 131 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
122
Voted
AIMS
2008
Springer
15 years 9 months ago
Dynamic Consistency Analysis for Convergent Operators
It has been shown that sets of convergent operators with a shared fixed point can simulate autonomic control mechanisms, but many questions remain about this management technique....
Alva L. Couch, Marc Chiarini
175
Voted
ACMSE
2008
ACM
15 years 4 months ago
Gnutella: integrating performance and security in fully decentralized P2P models
Peer-To-Peer (P2P) systems have made an enormous impact on the Internet, directly affecting its performance and security. The litigation against P2P file sharing has led some desi...
Rossana Motta, Wickus Nienaber, Jon Jenkins
JCP
2006
94views more  JCP 2006»
15 years 2 months ago
Broadcast Encryption Using Probabilistic Key Distribution and Applications
A family of novel broadcast encryption schemes based on probabilistic key pre-distribution are proposed, that enable multiple sources to broadcast secrets, without the use of asymm...
Mahalingam Ramkumar
AMEC
2004
Springer
15 years 8 months ago
Three Automated Stock-Trading Agents: A Comparative Study
Abstract. This paper documents the development of three autonomous stocktrading agents within the framework of the Penn Exchange Simulator (PXS), a novel stock-trading simulator th...
Alexander A. Sherstov, Peter Stone
231
Voted
CADE
2011
Springer
14 years 2 months ago
Deciding Security for Protocols with Recursive Tests
Abstract. Security protocols aim at securing communications over public networks. Their design is notoriously difficult and error-prone. Formal methods have shown their usefulness ...
Mathilde Arnaud, Véronique Cortier, St&eacu...