Sciweavers

4340 search results - page 83 / 868
» Formal Methods and Cryptography
Sort
View
113
Voted
ACNS
2008
Springer
132views Cryptology» more  ACNS 2008»
15 years 10 months ago
Analysis of EAP-GPSK Authentication Protocol
Abstract. The EAP-GPSK protocol is a lightweight, flexible authentication protocol relying on symmetric key cryptography. It is part of an ongoing IETF process to develop authenti...
John C. Mitchell, Arnab Roy, Paul Rowe, Andre Sced...
110
Voted
AINA
2007
IEEE
15 years 10 months ago
Agri-Food Traceability Management using a RFID System with Privacy Protection
In this paper an agri-food traceability system based on public key cryptography and Radio Frequency Identification (RFID) technology is proposed. In order to guarantee safety in f...
Paolo Bernardi, Claudio Demartini, Filippo Gandino...
114
Voted
ICFCA
2009
Springer
15 years 10 months ago
Identifying Ecological Traits: A Concrete FCA-Based Approach
Aurélie Bertaux, Florence Le Ber, Agn&egrav...
117
Voted
AFP
2008
Springer
241views Formal Methods» more  AFP 2008»
15 years 10 months ago
Libraries for Generic Programming in Haskell
Johan Jeuring, Sean Leather, José Pedro Mag...
129
Voted
ICFCA
2004
Springer
15 years 9 months ago
AddIntent: A New Incremental Algorithm for Constructing Concept Lattices
Dean van der Merwe, Sergei A. Obiedkov, Derrick G....