Sciweavers

1612 search results - page 283 / 323
» About models of security protocols
Sort
View
FMSD
2002
81views more  FMSD 2002»
14 years 9 months ago
A Notation and Logic for Mobile Computing
Abstract. We de ne a concurrent mobile system as one where independently executing components may migrate through some space during the course of the computation, and where the pat...
Gruia-Catalin Roman, Peter J. McCann
ETS
2002
IEEE
150views Hardware» more  ETS 2002»
14 years 9 months ago
Assessing group learning and shared understanding in technology-mediated interaction
Without shared understanding, hardly any group learning takes place. Though much has been written about the essence of shared understanding, less is known about how to assess the ...
Ingrid Mulder, Janine Swaak, Joseph Kessels
WD
2010
14 years 7 months ago
Vicinity resource cartography for delay-tolerant networks: A holistic perspective
In this paper we propose a distributed approach to construct vicinity resource maps at each node in a delaytolerant network. The scheme uses recent encounters to estimate the avail...
Gabriel Sandulescu, Péter Schaffer, Simin N...
ISSTA
2012
ACM
13 years 6 days ago
A quantitative study of accuracy in system call-based malware detection
Over the last decade, there has been a significant increase in the number and sophistication of malware-related attacks and infections. Many detection techniques have been propos...
Davide Canali, Andrea Lanzi, Davide Balzarotti, Ch...
AFRICACRYPT
2010
Springer
15 years 2 months ago
Strong Cryptography from Weak Secrets
the full version of the extended abstract which appears in Africacrypt ’10 (3 – 6 may 2010, Stellenbosch, South Africa) D. Bernstein and T. Lange Eds., Springer-Verlag, LNCS 60...
Xavier Boyen, Céline Chevalier, Georg Fuchs...