Sciweavers

1612 search results - page 270 / 323
» About models of security protocols
Sort
View
PRDC
2007
IEEE
15 years 4 months ago
Assessment of Message Missing Failures in FlexRay-Based Networks
This paper assesses message missing failures in a FlexRay-based network. The assessment is based on about 35680 bit-flip fault injections inside different parts of the FlexRay com...
Vahid Lari, Mehdi Dehbashi, Seyed Ghassem Miremadi...
ATAL
2004
Springer
15 years 3 months ago
Towards the Application of Argumentation-Based Dialogues for Education
This paper describes our work constructing a generalized framework for modeling multi agent interactions in education-related applications. Historically, interactive learning syst...
Elizabeth Sklar, Simon Parsons
CRYPTO
2005
Springer
144views Cryptology» more  CRYPTO 2005»
15 years 3 months ago
Analysis of Random Oracle Instantiation Scenarios for OAEP and Other Practical Schemes
We investigate several previously suggested scenarios of instantiating random oracles (ROs) with “realizable” primitives in cryptographic schemes. As candidates for such “in...
Alexandra Boldyreva, Marc Fischlin
POPL
2006
ACM
15 years 10 months ago
Decidability and proof systems for language-based noninterference relations
Noninterference is the basic semantical condition used to account for confidentiality and integrity-related properties in programming languages. There appears to be an at least im...
Mads Dam
SENSYS
2006
ACM
15 years 3 months ago
Interest dissemination with directional antennas for wireless sensor networks with mobile sinks
Introducing mobile data sinks into wireless sensor networks (WSNs) improves the energy efficiency and the network lifetime, and is demanded for many application scenarios, such a...
Yihong Wu, Lin Zhang, Yiqun Wu, Zhisheng Niu