Sciweavers

7530 search results - page 1345 / 1506
» Design and Implementation of the YAWL System
Sort
View
96
Voted
CSFW
2009
IEEE
15 years 2 months ago
Cryptographic Protocol Synthesis and Verification for Multiparty Sessions
We present the design and implementation of a compiler that, given high-level multiparty session descriptions, generates custom cryptographic protocols. Our sessions specify pre-a...
Karthikeyan Bhargavan, Ricardo Corin, Pierre-Malo ...
96
Voted
SP
2010
IEEE
222views Security Privacy» more  SP 2010»
15 years 2 months ago
A Symbolic Execution Framework for JavaScript
—As AJAX applications gain popularity, client-side JavaScript code is becoming increasingly complex. However, few automated vulnerability analysis tools for JavaScript exist. In ...
Prateek Saxena, Devdatta Akhawe, Steve Hanna, Feng...
71
Voted
ICAIL
2007
ACM
15 years 2 months ago
How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach
Laws set requirements that force organizations to assess the security and privacy of their IT systems and impose the adoption of the implementation of minimal precautionary securi...
Luca Compagna, Paul El Khoury, Fabio Massacci, Res...
97
Voted
ICB
2007
Springer
195views Biometrics» more  ICB 2007»
15 years 2 months ago
Identity Verification by Using Handprint
In recent years, palmprint based personal identification has been extensively explored by researchers. The success of this technology has demonstrated that the inner part of palm s...
Ying Hao, Tieniu Tan, Zhenan Sun, Yufei Han
ACSAC
2004
IEEE
15 years 1 months ago
Open-Source Applications of TCPA Hardware
How can Alice trust computation occurring at Bob's computer? Since it exists and is becoming ubiquitous, the current-generation TCPA/TCG hardware might enable a solution. Whe...
John Marchesini, Sean W. Smith, Omen Wild, Joshua ...
« Prev « First page 1345 / 1506 Last » Next »