Sciweavers

86 search results - page 7 / 18
» Impossibility Results for Secret Establishment
Sort
View
ISW
2004
Springer
15 years 2 months ago
Re-thinking Security in IP Based Micro-Mobility
Security problems in micro-mobility are mostly related to trust establishment between mobile nodes and middle-boxes, i.e. mobile anchor points. In this paper, we present a secure m...
Jukka Ylitalo, Jan Melén, Pekka Nikander, V...
ICML
2008
IEEE
15 years 10 months ago
Non-parametric policy gradients: a unified treatment of propositional and relational domains
Policy gradient approaches are a powerful instrument for learning how to interact with the environment. Existing approaches have focused on propositional and continuous domains on...
Kristian Kersting, Kurt Driessens
ICCCN
2008
IEEE
15 years 3 months ago
A New Proposal for QKD Relaying Models
—We investigate a quasi-trusted QKD relaying model. This is a three-party communication model. Two nodes Alice and Bob want to establish a secret key. However, the distance betwe...
Cuong Le Quoc, Patrick Bellot
MSR
2010
ACM
15 years 2 months ago
An extensive comparison of bug prediction approaches
Abstract—Reliably predicting software defects is one of software engineering’s holy grails. Researchers have devised and implemented a plethora of bug prediction approaches var...
Marco D'Ambros, Michele Lanza, Romain Robbes
AUSFORENSICS
2003
14 years 10 months ago
Design of a Network-Access Audit Log for Security Monitoring and Forensic Investigation
An attempt at determining the source of anomalous network traffic may result in the identification of the networked system where it originated. From a forensic point of view it is...
Atif Ahmad, Tobias Ruighaver