Sciweavers

3751 search results - page 662 / 751
» Events in security protocols
Sort
View
ECRA
2007
69views more  ECRA 2007»
15 years 15 days ago
NetPay: An off-line, decentralized micro-payment system for thin-client applications
Micro-payment systems have become popular in recent times as the desire to support low-value, high-volume transactions of text, music, clip-art, video and other media has increase...
Xiaoling Dai, John C. Grundy
SIGMETRICS
2008
ACM
130views Hardware» more  SIGMETRICS 2008»
15 years 13 days ago
Using probabilistic model checking in systems biology
Probabilistic model checking is a formal verification framework for systems which exhibit stochastic behaviour. It has been successfully applied to a wide range of domains, includ...
Marta Z. Kwiatkowska, Gethin Norman, David Parker
COMCOM
2002
189views more  COMCOM 2002»
15 years 10 days ago
Intrusion detection techniques and approaches
Recent security incidents and analysis have demonstrated that manual response to such attacks is no longer feasible. Intrusion Detection systems offer techniques for modelling and...
Theuns Verwoerd, Ray Hunt
CCR
1999
110views more  CCR 1999»
15 years 6 days ago
Independent active program representation using ASN. 1
act Syntax Notation One (ASN.1) can be used as a common substrate for representing active programs. An active networking framework, using ASN.1 whereby any active network solution ...
Brad Williamson, Craig Farrell
92
Voted
CORR
2009
Springer
95views Education» more  CORR 2009»
14 years 10 months ago
Execution Models for Choreographies and Cryptoprotocols
A choreography describes a transaction in which several principals interact. Since choreographies frequently describe business processes affecting substantial assets, we need a se...
Marco Carbone, Joshua D. Guttman