Sciweavers

3420 search results - page 94 / 684
» A Language-Based Approach to Security
Sort
View
115
Voted
ICDCS
2005
IEEE
15 years 9 months ago
Equational Approach to Formal Analysis of TLS
TLS has been formally analyzed with the OTS/CafeOBJ method. In the method, distributed systems are modeled as transition systems, which are written in terms of equations, and it i...
Kazuhiro Ogata, Kokichi Futatsugi
120
Voted
FSE
2001
Springer
116views Cryptology» more  FSE 2001»
15 years 8 months ago
NESSIE: A European Approach to Evaluate Cryptographic Algorithms
The NESSIE project (New European Schemes for Signature, Integrity and Encryption) intends to put forward a portfolio containing the next generation of cryptographic primitives. The...
Bart Preneel
119
Voted
CSFW
1996
IEEE
15 years 7 months ago
An Immunological Approach to Change Detection: Theoretical Results
: This paper examines some of the theoretical foundations of the distributable change detection method introduced by Forrest et al. in [10], including fundamental bounds on some of...
Patrik D'haeseleer
151
Voted
DIMEA
2008
137views Multimedia» more  DIMEA 2008»
15 years 5 months ago
Biometric tendency recognition and classification system: an artistic approach
The Biometric Tendency Recognition and Classification System is a software application that continuously measures a participant's physiological responses to a given image and...
Carlos Castellanos, Philippe Pasquier, Luther Thie...
135
Voted
EUROISI
2008
15 years 5 months ago
An Information Theory Approach to Identify Sets of Key Players
This paper presents an application of information theory to identify sets of key players in social networks. First, we define two entropy measures that we use to analyze the struct...
Daniel Ortiz Arroyo, Dil Muhammad Akbar Hussain