Sciweavers

1612 search results - page 261 / 323
» About models of security protocols
Sort
View
CRYPTO
2011
Springer
222views Cryptology» more  CRYPTO 2011»
13 years 9 months ago
The PHOTON Family of Lightweight Hash Functions
RFID security is currently one of the major challenges cryptography has to face, often solved by protocols assuming that an on-tag hash function is available. In this article we pr...
Jian Guo 0001, Thomas Peyrin, Axel Poschmann
ECAI
2004
Springer
15 years 3 months ago
An architecture based on semantic weblogs for exploring the Web of People
This paper presents an architecture that helps users to collect and qualify meta-information about web resources within a weblog and then share them with a group of people. Our arc...
Tuan-Anh Ta, Jean-Marc Saglio, Michel Plu
AGENTS
2000
Springer
15 years 2 months ago
A knowledge-based approach for designing intelligent team training systems
This paper presents a knowledge approach to designing team training systems using intelligent agents. We envision a computer-based training system in which teams are trained by pu...
Jianwen Yin, Michael S. Miller, Thomas R. Ioerger,...
CORR
2008
Springer
143views Education» more  CORR 2008»
14 years 10 months ago
A Type System for Data-Flow Integrity on Windows Vista
The Windows Vista operating system implements an interesting model of multi-level integrity. We observe that in this model, trusted code must participate in any information-flow a...
Avik Chaudhuri, Prasad Naldurg, Sriram K. Rajamani
ISW
2004
Springer
15 years 3 months ago
Low-Level Ideal Signatures and General Integrity Idealization
Abstract. Recently we showed how to justify a Dolev-Yao type model of cryptography as used in virtually all automated protocol provers under active attacks and in arbitrary protoco...
Michael Backes, Birgit Pfitzmann, Michael Waidner