Sciweavers

12753 search results - page 2388 / 2551
» is 2002
Sort
View
169
Voted
CSFW
2002
IEEE
15 years 8 months ago
Capturing Parallel Attacks within the Data Independence Framework
We carry forward the work described in our previous papers [3, 14, 12] on the application of data independence to the model checking of cryptographic protocols using CSP [13] and ...
Philippa J. Broadfoot, A. W. Roscoe
121
Voted
CSFW
2002
IEEE
15 years 8 months ago
Types and Effects for Asymmetric Cryptographic Protocols
We present the first type and effect system for proving authenticity properties of security protocols based on asymmetric cryptography. The most significant new features of our ...
Andrew D. Gordon, Alan Jeffrey
135
Voted
CSFW
2002
IEEE
15 years 8 months ago
Security Protocol Design via Authentication Tests
We describe a protocol design process, and illustrate its use by creating ATSPECT, an Authentication Test-based Secure Protocol for Electronic Commerce Transactions. The design pr...
Joshua D. Guttman
136
Voted
CW
2002
IEEE
15 years 8 months ago
Beyond Flat Panning and Zooming: Dolly-Enhanced SQTVR
This paper describes a novel solution to problems associated with interactive display of immersive stereographic imagery via Apple’s QuickTime Virtual Reality (QTVR) technology....
N. A. Bolhassan, William L. Martens, Michael M. Co...
CW
2002
IEEE
15 years 8 months ago
Efficient Data Compression Methods for Multi-Dimensional Sparse Array Operations
For sparse array operations, in general, the sparse arrays are compressed by some data compression schemes in order to obtain better performance. The Compressed Row/Column Storage...
Chun-Yuan Lin, Yeh-Ching Chung, Jen-Shiuh Liu
« Prev « First page 2388 / 2551 Last » Next »