Sciweavers

3751 search results - page 186 / 751
» Events in security protocols
Sort
View
IPL
2006
85views more  IPL 2006»
15 years 4 months ago
A flaw in the electronic commerce protocol SET
The Secure Electronic Transaction (SET) protocol has been developed by the major credit card companies in association with some of the top software corporations to secure e-commer...
Srecko Brlek, Sardaouna Hamadou, John Mullins
CRYPTO
1999
Springer
152views Cryptology» more  CRYPTO 1999»
15 years 8 months ago
An Information Theoretic Analysis of Rooted-Tree Based Secure Multicast Key Distribution Schemes
Several variations of rooted tree based solutions have been recently proposed for member revocation in multicast communications [18, 19, 20, 21]. In this paper, we show that by ass...
Radha Poovendran, John S. Baras
DSRT
2005
IEEE
15 years 9 months ago
A Multi-Formalism Modeling Composability Framework: Agent and Discrete-Event Models
It is common practice to build complex systems from disparate sub-systems. Model composability is concerned with techniques for developing a whole model of a system from the model...
Hessam S. Sarjoughian, Dongping Huang
AVSS
2003
IEEE
15 years 9 months ago
Invariant Feature Extraction and Biased Statistical Inference for Video Surveillance
Using cameras for detecting hazardous or suspicious events has spurred new research for security concerns. To make such detection reliable, researchers must overcome difficulties...
Yi-Leh Wu, Long Jiao, Gang Wu, Edward Y. Chang, Yu...
PAISI
2007
Springer
15 years 10 months ago
Security Assessment for Application Network Services Using Fault Injection
Vulnerabilities in network protocol software have been problematic since Internet infrastructure was deployed. These vulnerabilities damage the reliability of network software and ...
Hyungwoo Kang, Dong Hoon Lee