Sciweavers

2162 search results - page 287 / 433
» A Meta-Notation for Protocol Analysis
Sort
View
EUROCRYPT
2010
Springer
15 years 2 months ago
Plaintext-Dependent Decryption: A Formal Security Treatment of SSH-CTR
This paper presents a formal security analysis of SSH in counter mode in a security model that accurately captures the capabilities of real-world attackers, as well as security-rel...
Kenneth G. Paterson, Gaven J. Watson
CHI
1999
ACM
15 years 2 months ago
The Tangled Web we Wove: A Taskonomy of WWW Use
A prerequisite to the effective design of user interfaces is an understanding of the tasks for which that interface will actually be used. Surprisingly little task analysis has ap...
Michael D. Byrne, Bonnie E. John, Neil S. Wehrle, ...
CSFW
2010
IEEE
15 years 1 months ago
Automating Open Bisimulation Checking for the Spi Calculus
We consider the problem of automating open bisimulation checking for the spi-calculus, an extension of the pi-calculus with cryptographic primitives. The notion of open bisimulatio...
Alwen Tiu, Jeremy E. Dawson
BMCBI
2004
131views more  BMCBI 2004»
14 years 10 months ago
A web services choreography scenario for interoperating bioinformatics applications
Background: Very often genome-wide data analysis requires the interoperation of multiple databases and analytic tools. A large number of genome databases and bioinformatics applic...
Remko de Knikker, Youjun Guo, Jin-long Li, Albert ...
TMC
2008
210views more  TMC 2008»
14 years 9 months ago
Adaptive Cluster-Based Data Collection in Sensor Networks with Direct Sink Access
Recently wireless sensor networks featuring direct sink access have been studied as an efficient architecture to gather and process data for numerous applications. In this paper, w...
Mahdi Lotfinezhad, Ben Liang, Elvino S. Sousa