Sciweavers

3544 search results - page 80 / 709
» Information Security in Open Systems
Sort
View
ICC
2009
IEEE
127views Communications» more  ICC 2009»
15 years 5 months ago
Security Games with Incomplete Information
—We study two-player security games which can be viewed as sequences of nonzero-sum matrix games where at each stage of the iterations the players make imperfect observations of ...
Kien C. Nguyen, Tansu Alpcan, Tamer Basar
CSFW
2000
IEEE
15 years 3 months ago
Information Flow Analysis in a Discrete-Time Process Algebra
Some of the non interference properties studied in [4, 6, 18] for information flow analysis in computer systems, notably Æ , are reformulated here in a realtime setting. This is...
Riccardo Focardi, Roberto Gorrieri, Fabio Martinel...
91
Voted
ACL
2003
15 years 13 days ago
A Speech Interface for Open-Domain Question-Answering
Speech interfaces to question-answering systems offer significant potential for finding information with phones and mobile networked devices. We describe a demonstration of spok...
Edward Schofield, Zhiping Zheng
SECURWARE
2008
IEEE
15 years 5 months ago
Security Patterns for Capturing Encryption-Based Access Control to Sensor Data
—A security pattern describes a particular recurring security problem that arises in specific contexts, and presents a well-proven generic solution for it [1]. This paper descri...
Ángel Cuevas, Paul El Khoury, Laurent Gomez...