Sciweavers

11376 search results - page 2217 / 2276
» Willow System Demonstration
Sort
View
FC
2006
Springer
129views Cryptology» more  FC 2006»
14 years 2 months ago
Phoolproof Phishing Prevention
Abstract. Phishing, or web spoofing, is a growing problem: the Anti-Phishing Working Group (APWG) received almost 14,000 unique phishing reports in August 2005, a 56% jump over the...
Bryan Parno, Cynthia Kuo, Adrian Perrig
FLOPS
2006
Springer
14 years 2 months ago
Contracts as Pairs of Projections
Abstract. Assertion-based contracts provide a powerful mechanism for stating invariants at module boundaries and for enforcing them uniformly. In 2002, Findler and Felleisen showed...
Robert Bruce Findler, Matthias Blume
FM
2006
Springer
146views Formal Methods» more  FM 2006»
14 years 2 months ago
Formal Modeling of Communication Protocols by Graph Transformation
Formal modeling is a crucial first step in the analysis of safety critical communication protocols such as IP Telephony. These protocols are notoriously resistant to formal modelin...
Zarrin Langari, Richard J. Trefler
ACSAC
2001
IEEE
14 years 2 months ago
Verifiable Identifiers in Middleware Security
fies a number of issues related to security information r semantics on different layers of abstraction. In particular it is difficult to express caller and target accurately in the...
Ulrich Lang, Dieter Gollmann, Rudolf Schreiner
ARVLSI
2001
IEEE
267views VLSI» more  ARVLSI 2001»
14 years 2 months ago
Focal-Plane Image and Beam Quality Sensors for Adaptive Optics
Control of adaptive optical elements for real-time wavefront phase distortion compensation is a rapidly growing field of research and technology development. Wavefront correction ...
Marc Cohen, Gert Cauwenberghs, Mikhail Vorontsov, ...
« Prev « First page 2217 / 2276 Last » Next »