Sciweavers

495 search results - page 11 / 99
» MASC - Monitoring and Security of Containers
Sort
View
FUIN
2007
84views more  FUIN 2007»
15 years 1 months ago
Observation Based System Security
A formal model for description of passive and active timing attacks is presented, studied and compared with other security concepts. It is based on a timed process algebra and on a...
Damas P. Gruska
IJNSEC
2006
81views more  IJNSEC 2006»
15 years 1 months ago
Small Size Hashes with Enhanced Security
This paper contains techniques for enhancing the strength of any cryptographic hash function. For an "ideal", traditional hash function with an m-bit result, the complex...
Lars R. Knudsen
FSTTCS
2007
Springer
15 years 7 months ago
Safely Composing Security Protocols
Security protocols are small programs that are executed in hostile environments. Many results and tools have been developed to formally analyze the security of a protocol. However ...
Véronique Cortier, Jérémie De...
IJNSEC
2011
239views more  IJNSEC 2011»
14 years 8 months ago
Digital Signature Scheme with Message Recovery Using Knapsack-based ECC
Digital signature authentication scheme provides secure communication between two users. Digital signatures guarantee end-to-end message integrity and authentication information a...
R. Rajaram Ramasamy, M. Amutha Prabakar
102
Voted
AGENTS
2000
Springer
15 years 5 months ago
Unsupervised clustering of robot activities: a Bayesian approach
Our goal is for robots to learn conceptual systems su cient for natural language and planning. The learning should be autonomous, without supervision. The rst steps in building a ...
Marco Ramoni, Paola Sebastiani, Paul R. Cohen