Sciweavers

219 search results - page 26 / 44
» Context-aware counter abstraction
Sort
View
CEEMAS
2007
Springer
15 years 6 months ago
Commitment Monitoring in a Multiagent System
Abstract. Agent Communication Languages (ACLs) play a fundamental role in open multiagent systems where message exchange is the main if not the only way for agents to coordinate th...
Paola Spoletini, Mario Verdicchio
ICC
2008
IEEE
163views Communications» more  ICC 2008»
15 years 6 months ago
A New Replay Attack Against Anonymous Communication Networks
Abstract— Tor is a real-world, circuit-based low-latency anonymous communication network, supporting TCP applications on the Internet. In this paper, we present a new class of at...
Ryan Pries, Wei Yu, Xinwen Fu, Wei Zhao
HICSS
2003
IEEE
164views Biometrics» more  HICSS 2003»
15 years 5 months ago
On a Text-Processing Approach to Facilitating Autonomous Deception Detection
Abstract—Current techniques towards information security have limited capabilities to detect and counter attacks that involve different kinds of masquerade and spread of misinfor...
Therani Madhusudan
CRYPTO
2012
Springer
254views Cryptology» more  CRYPTO 2012»
13 years 2 months ago
Breaking and Repairing GCM Security Proofs
Abstract. In this paper, we study the security proofs of GCM (Galois/Counter Mode of Operation). We first point out that a lemma, which is related to the upper bound on the probab...
Tetsu Iwata, Keisuke Ohashi, Kazuhiko Minematsu
ALDT
2009
Springer
172views Algorithms» more  ALDT 2009»
15 years 6 months ago
Extending Argumentation to Make Good Decisions
Abstract. Argumentation has been acknowledged as a powerful mechanism for automated decision making. In this context several recent works have studied the problem of accommodating ...
Yannis Dimopoulos, Pavlos Moraitis, Leila Amgoud