Sciweavers

1054 search results - page 48 / 211
» From a Verified Kernel towards Verified Systems
Sort
View
INFOCOM
2006
IEEE
15 years 8 months ago
Cooperative Security for Network Coding File Distribution
Abstract— Peer-to-peer content distribution networks can suffer from malicious participants that corrupt content. Current systems verify blocks with traditional cryptographic sig...
Christos Gkantsidis, Pablo Rodriguez
IJACTAICIT
2010
121views more  IJACTAICIT 2010»
14 years 11 months ago
On Improving Feasibility and Security Measures of Online Authentication
Online service is an important driving force behind many of today's Web 2.0 applications. For security and privacy concerns, authentication is required for all of services th...
Jing-Chiou Liou, Sujith Bhashyam
ICDAR
2009
IEEE
15 years 8 months ago
Machine Authentication of Security Documents
This paper presents a pioneering effort towards machine authentication of security documents like bank cheques, legal deeds, certificates, etc. that fall under the same class as f...
Utpal Garain, Biswajit Halder
ISOLA
2004
Springer
15 years 7 months ago
Designing Safe, Reliable Systems using Scade
As safety critical systems increase in size and complexity, the need for efficient tools to verify their reliability grows. In this paper we present a tool that helps engineers des...
Parosh Aziz Abdulla, Johan Deneaux, Gunnar St&arin...
CSFW
2007
IEEE
15 years 5 months ago
A Type Discipline for Authorization in Distributed Systems
We consider the problem of statically verifying the conformance of the code of a system to an explicit authorization policy. In a distributed setting, some part of the system may ...
Cédric Fournet, Andy Gordon, Sergio Maffeis