Sciweavers

23 search results - page 5 / 5
» Automated Analysis and Synthesis of Authenticated Encryption...
Sort
View
GECCO
2008
Springer
180views Optimization» more  GECCO 2008»
13 years 7 months ago
Bond-graphs + genetic programming: analysis of an automatically synthesized rotary mechanical system
Initial results of an experiment devised to combine Bond-Graph modeling and simulation with genetic programming for automated design of a simple mechatronic system are reported in...
Saheeb Ahmed Kayani, Muhammad Afzaal Malik
SASN
2003
ACM
13 years 11 months ago
Location-based pairwise key establishments for static sensor networks
Sensor networks are ideal candidates for applications such as target tracking and environment monitoring. Security in sensor networks is critical when there are potential adversar...
Donggang Liu, Peng Ning
GAMESEC
2010
244views Game Theory» more  GAMESEC 2010»
13 years 4 months ago
The Password Game: Negative Externalities from Weak Password Practices
The combination of username and password is widely used as a human authentication mechanism on the Web. Despite this universal adoption and despite their long tradition, password s...
Sören Preibusch, Joseph Bonneau