Sciweavers

1612 search results - page 261 / 323
» About models of security protocols
Sort
View
CRYPTO
2011
Springer
222views Cryptology» more  CRYPTO 2011»
14 years 1 months ago
The PHOTON Family of Lightweight Hash Functions
RFID security is currently one of the major challenges cryptography has to face, often solved by protocols assuming that an on-tag hash function is available. In this article we pr...
Jian Guo 0001, Thomas Peyrin, Axel Poschmann
ECAI
2004
Springer
15 years 6 months ago
An architecture based on semantic weblogs for exploring the Web of People
This paper presents an architecture that helps users to collect and qualify meta-information about web resources within a weblog and then share them with a group of people. Our arc...
Tuan-Anh Ta, Jean-Marc Saglio, Michel Plu
AGENTS
2000
Springer
15 years 5 months ago
A knowledge-based approach for designing intelligent team training systems
This paper presents a knowledge approach to designing team training systems using intelligent agents. We envision a computer-based training system in which teams are trained by pu...
Jianwen Yin, Michael S. Miller, Thomas R. Ioerger,...
CORR
2008
Springer
143views Education» more  CORR 2008»
15 years 1 months ago
A Type System for Data-Flow Integrity on Windows Vista
The Windows Vista operating system implements an interesting model of multi-level integrity. We observe that in this model, trusted code must participate in any information-flow a...
Avik Chaudhuri, Prasad Naldurg, Sriram K. Rajamani
ISW
2004
Springer
15 years 6 months ago
Low-Level Ideal Signatures and General Integrity Idealization
Abstract. Recently we showed how to justify a Dolev-Yao type model of cryptography as used in virtually all automated protocol provers under active attacks and in arbitrary protoco...
Michael Backes, Birgit Pfitzmann, Michael Waidner