Sciweavers

161 search results - page 6 / 33
» Combining Algorithms for Deciding Knowledge in Security Prot...
Sort
View
TOCL
2008
128views more  TOCL 2008»
14 years 11 months ago
A comprehensive combination framework
fragment enjoys suitable noetherianity conditions and admits an abstract version of a `KeislerShelah like' isomorphism theorem. We show that this general decidability transfer...
Silvio Ghilardi, Enrica Nicolini, Daniele Zucchell...
CORR
2006
Springer
104views Education» more  CORR 2006»
14 years 11 months ago
Modeling Adversaries in a Logic for Security Protocol Analysis
Logics for security protocol analysis require the formalization of an adversary model that specifies the capabilities of adversaries. A common model is the Dolev-Yao model, which c...
Joseph Y. Halpern, Riccardo Pucella
ATVA
2006
Springer
160views Hardware» more  ATVA 2006»
15 years 3 months ago
Monotonic Set-Extended Prefix Rewriting and Verification of Recursive Ping-Pong Protocols
Ping-pong protocols with recursive definitions of agents, but without any active intruder, are a Turing powerful model. We show that under the environment sensitive semantics (i.e....
Giorgio Delzanno, Javier Esparza, Jirí Srba
FROCOS
2007
Springer
15 years 5 months ago
Towards an Automatic Analysis of Web Service Security
Web services send and receive messages in XML syntax with some parts hashed, encrypted or signed, according to the WS-Security standard. In this paper we introduce a model to forma...
Yannick Chevalier, Denis Lugiez, Michaël Rusi...
IEAAIE
2010
Springer
14 years 9 months ago
The Combination of a Causal and Emotional Learning Mechanism for an Improved Cognitive Tutoring Agent
This paper describes a Conscious Tutoring System (CTS) capable of dynamic fine-tuned assistance to users. We put forth the combination of a Causal Learning and Emotional learning m...
Usef Faghihi, Philippe Fournier-Viger, Roger Nkamb...