Sciweavers

671 search results - page 81 / 135
» A Modeling Framework for Generating Security Protocol Specif...
Sort
View
ARGMAS
2004
Springer
15 years 5 months ago
Specifying and Implementing a Persuasion Dialogue Game Using Commitments and Arguments
In this paper we propose a new persuasion dialogue game for agent communication. We show how this dialogue game is modeled by a framework based on social commitments and arguments....
Jamal Bentahar, Bernard Moulin, Brahim Chaib-draa
ASAP
2008
IEEE
167views Hardware» more  ASAP 2008»
15 years 6 months ago
Extending the SIMPPL SoC architectural framework to support application-specific architectures on multi-FPGA platforms
Process technology has reduced in size such that it is possible to implement complete applicationspecific architectures as Systems-on-Chip (SoCs) using both Application-Specific I...
David Dickin, Lesley Shannon
EUROCAST
2007
Springer
161views Hardware» more  EUROCAST 2007»
15 years 3 months ago
Using Verification Technology to Specify and Detect Malware
Abstract. Computer viruses and worms are major threats for our computer infrastructure, and thus, for economy and society at large. Recent work has demonstrated that a model checki...
Andreas Holzer, Johannes Kinder, Helmut Veith
ASIACRYPT
2009
Springer
15 years 6 months ago
Security Notions and Generic Constructions for Client Puzzles
Computational puzzles are mildly difficult computational problems that require resources (processor cycles, memory, or both) to solve. Puzzles have found a variety of uses in secu...
Liqun Chen, Paul Morrissey, Nigel P. Smart, Bogdan...
SEC
2008
15 years 1 months ago
Hiding in Groups: On the Expressiveness of Privacy Distributions
Many applications inherently disclose information because perfect privacy protection is prohibitively expensive. RFID tags, for example, cannot be equipped with the cryptographic p...
Karsten Nohl, David Evans