Sciweavers

1612 search results - page 280 / 323
» About models of security protocols
Sort
View
ECCC
2010
98views more  ECCC 2010»
14 years 7 months ago
Efficient Semantic Communication via Compatible Beliefs
In previous works, Juba and Sudan [6] and Goldreich, Juba and Sudan [4] considered the idea of "semantic communication", wherein two players, a user and a server, attemp...
Brendan Juba, Madhu Sudan
SIGMOD
1999
ACM
99views Database» more  SIGMOD 1999»
15 years 2 months ago
Belief Reasoning in MLS Deductive Databases
It is envisaged that the application of the multilevel security (MLS) scheme will enhance exibility and e ectiveness of authorization policies in shared enterprise databases and w...
Hasan M. Jamil
IEEEARES
2008
IEEE
15 years 4 months ago
Fault Effects in FlexRay-Based Networks with Hybrid Topology
This paper investigates fault effects and error propagation in a FlexRay-based network with hybrid topology that includes a bus subnetwork and a star subnetwork. The investigation...
Mehdi Dehbashi, Vahid Lari, Seyed Ghassem Miremadi...
WORDS
2005
IEEE
15 years 3 months ago
Progressive Ranking and Composition of Web Services Using Covering Arrays
Major computer companies and government agencies are adopting Web Services (WS) technology. Web services must ensure interoperability and security, and be reliable and trustworthy...
Charles J. Colbourn, Yinong Chen, Wei-Tek Tsai
ACNS
2005
Springer
167views Cryptology» more  ACNS 2005»
15 years 3 months ago
Identity Based Encryption Without Redundancy
This paper presents a first example of secure identity based encryption scheme (IBE) without redundancy in the sense of Phan and Pointcheval. This modification of the Boneh-Frank...
Benoît Libert, Jean-Jacques Quisquater