Sciweavers

3420 search results - page 165 / 684
» A Language-Based Approach to Security
Sort
View
DAGSTUHL
2006
15 years 5 months ago
Nonlinear Transaction Pricing in the Securities Trading Value Chain
Most of the research on transaction costs in the market microstructure literature focuses on implicit transaction costs. Research on the design of price schedules for explicit tra...
Matthias Burghardt
CIIA
2009
15 years 5 months ago
LCF-style for Secure Verification Platform based on Multiway Decision Graphs
Abstract. Formal verification of digital systems is achieved, today, using one of two main approaches: states exploration (mainly model checking and equivalence checking) or deduct...
Sa'ed Abed, Otmane Aït Mohamed
JSW
2007
97views more  JSW 2007»
15 years 4 months ago
Using Aspect Programming to Secure Web Applications
—As the Internet users increase, the need to protect  web servers from malicious users has become a priority in  many   organizations   and   companies.   ...
Gabriel Hermosillo, Roberto Gomez, Lionel Seinturi...
RTA
2009
Springer
15 years 10 months ago
YAPA: A Generic Tool for Computing Intruder Knowledge
Reasoning about the knowledge of an attacker is a necessary step in many formal analyses of security protocols. In the framework of the applied pi calculus, as in similar languages...
Mathieu Baudet, Véronique Cortier, St&eacut...
JSAC
2006
167views more  JSAC 2006»
15 years 4 months ago
Secure and resilient clock synchronization in wireless sensor networks
Abstract--Wireless sensor networks have received a lot of attention recently due to its wide applications. An accurate and synchronized clock time is crucial in many sensor network...
Kun Sun, Peng Ning, Cliff Wang