Sciweavers

24 search results - page 4 / 5
» ANN-modeled-classification based on Pi-Calculus
Sort
View
CSFW
2010
IEEE
13 years 8 months ago
Formal Verification of Privacy for RFID Systems
RFID tags are being widely employed in a variety of applications, ranging from barcode replacement to electronic passports. Their extensive use, however, in combination with their ...
Mayla Brusò, Konstantinos Chatzikokolakis, ...
AINA
2008
IEEE
13 years 11 months ago
Performance Optimization of Temporal Reasoning for Grid Workflows Using Relaxed Region Analysis
With quick evolution of grid technologies and increasing complexity of e-Science applications, reasoning temporal properties of grid workflows to ensure reliability and trustworth...
Ke Xu, Junwei Cao, Lianchen Liu, Cheng Wu
CSFW
2006
IEEE
13 years 11 months ago
Secrecy by Typing and File-Access Control
Secrecy properties can be guaranteed through a combination of static and dynamic checks. The static checks may include the application of special type systems with notions of secr...
Avik Chaudhuri, Martín Abadi
CCS
2005
ACM
13 years 11 months ago
Deciding security of protocols against off-line guessing attacks
We provide an effective procedure for deciding the existence of off-line guessing attacks on security protocols, for a bounded number of sessions. The procedure consists of a co...
Mathieu Baudet
ESORICS
2010
Springer
13 years 6 months ago
Election Verifiability in Electronic Voting Protocols
We present a formal, symbolic definition of election verifiability for electronic voting protocols in the context of the applied pi calculus. Our definition is given in terms of bo...
Steve Kremer, Mark Ryan, Ben Smyth