Sciweavers

222 search results - page 36 / 45
» How to Forget a Secret
Sort
View
CCS
2010
ACM
14 years 10 months ago
Symbolic security analysis of ruby-on-rails web applications
Many of today's web applications are built on frameworks that include sophisticated defenses against malicious adversaries. However, mistakes in the way developers deploy tho...
Avik Chaudhuri, Jeffrey S. Foster
BIOSYSTEMS
2008
72views more  BIOSYSTEMS 2008»
14 years 10 months ago
The manipulation of calcium oscillations by harnessing self-organisation
This paper investigates how self-organisation might be harnessed for the manipulation and control of calcium oscillations. Calcium signalling mechanisms are responsible for a numb...
Cristina Costa Santini, Andy M. Tyrrell
IJNSEC
2006
143views more  IJNSEC 2006»
14 years 10 months ago
Password Authentication Schemes: Current Status and Key Issues
Password authentication is one of the simplest and the most convenient authentication mechanisms to deal with secret data over insecure networks. It is more frequently required in...
Chwei-Shyong Tsai, Cheng-Chi Lee, Min-Shiang Hwang
JSAC
2006
155views more  JSAC 2006»
14 years 10 months ago
LR-AKE-Based AAA for Network Mobility (NEMO) Over Wireless Links
Network mobility introduces far more complexity than host mobility. Therefore, host mobility protocols such as Mobile IPv6 (MIPv6) need to be extended to support this new type of m...
Hanane Fathi, SeongHan Shin, Kazukuni Kobara, Shya...
INFORMATICALT
2007
76views more  INFORMATICALT 2007»
14 years 10 months ago
An Integrative Framework to Protocol Analysis and Repair: Bellare-Rogaway Model + Planning + Model Checker
A modified version of the Bellare and Rogaway (1993) adversarial model is encoded using Asynchronous Product Automata (APA). A model checker tool, Simple Homomorphism Verificatio...
Kim-Kwang Raymond Choo