Sciweavers

691 search results - page 124 / 139
» A New Security Model for Authenticated Key Agreement
Sort
View
ASIAN
2007
Springer
126views Algorithms» more  ASIAN 2007»
15 years 6 months ago
Computational Semantics for Basic Protocol Logic - A Stochastic Approach
Abstract. This paper is concerned about relating formal and computational models of cryptography in case of active adversaries when formal security analysis is done with first ord...
Gergei Bana, Koji Hasebe, Mitsuhiro Okada
EUROCRYPT
2011
Springer
14 years 3 months ago
Decentralizing Attribute-Based Encryption
We propose a Multi-Authority Attribute-Based Encryption (ABE) system. In our system, any party can become an authority and there is no requirement for any global coordination othe...
Allison B. Lewko, Brent Waters
ESCIENCE
2007
IEEE
15 years 3 months ago
Formal Modeling and Analysis of Scientific Workflows Using Hierarchical State Machines
Scientific workflows have recently emerged as a new paradigm for representing and managing complex distributed scientific computations and data analysis, and have enabled and acce...
Ping Yang, Zijiang Yang, Shiyong Lu
PR
2010
151views more  PR 2010»
14 years 10 months ago
Coupled region-edge shape priors for simultaneous localization and figure-ground segmentation
We propose a new algorithm for simultaneous localization and figure-ground segmentation where coupled region-edge shape priors are involved with two different but complementary ...
Cheng Chen, Guoliang Fan
POLICY
2007
Springer
15 years 5 months ago
Proteus: A Semantic Context-Aware Adaptive Policy Model
The growing diffusion of portable devices enables users to benefit from anytime and anywhere impromptu collaboration. Appropriate policy models that take into account the dynamici...
Alessandra Toninelli, Rebecca Montanari, Lalana Ka...