Sciweavers

1825 search results - page 310 / 365
» Cryptographic Securities Exchanges
Sort
View
ATVA
2006
Springer
160views Hardware» more  ATVA 2006»
15 years 3 months ago
Monotonic Set-Extended Prefix Rewriting and Verification of Recursive Ping-Pong Protocols
Ping-pong protocols with recursive definitions of agents, but without any active intruder, are a Turing powerful model. We show that under the environment sensitive semantics (i.e....
Giorgio Delzanno, Javier Esparza, Jirí Srba
SEC
2007
15 years 1 months ago
Trust Evaluation for Web Applications based on Behavioral Analysis
This paper deals with a joint use of a trust evaluation approach and access control mechanisms for improving security in Web-usage. Trust evaluation is achieved by means of both be...
Luiz Fernando Rust C. Carmo, Breno G. de Oliveira,...
86
Voted
NETWORKING
2004
15 years 1 months ago
Performance Modelling and Evaluation of Firewall Architectures for Multimedia Applications
Firewalls are a well-established security mechanism to restrict the traffic exchanged between networks to a certain subset of users and applications. In order to cope with new appl...
Utz Roedig, Jens Schmitt
IADIS
2003
15 years 1 months ago
Moda-Ml, an Interoperability Framework for the Textile-Clothing Sector
The MODA-ML project aims to enhance the interoperability between enterprises in the Textile/Clothing sector defining a common interchange language based on a set of XML business c...
Nicola Gessa, Fabio Vitali, Guido Cucchiara, Piero...
DCC
2000
IEEE
14 years 11 months ago
Discrete Logarithms: The Past and the Future
The first practical public key cryptosystem to be published, the Diffie-Hellman key exchange algorithm, was based on the assumption that discrete logarithms are hard to compute. T...
Andrew M. Odlyzko