Sciweavers

495 search results - page 83 / 99
» MASC - Monitoring and Security of Containers
Sort
View
JFP
2008
125views more  JFP 2008»
14 years 10 months ago
Types and trace effects of higher order programs
This paper shows how type effect systems can be combined with model-checking techniques to produce powerful, automatically verifiable program logics for higher order programs. The...
Christian Skalka, Scott F. Smith, David Van Horn
TIFS
2008
183views more  TIFS 2008»
14 years 10 months ago
Blind Authentication Using Periodic Properties of Interpolation
In this paper we analyze and analytically describe the specific statistical changes brought into the covariance structure of signal by the interpolation process. We show that inter...
Babak Mahdian, Stanislav Saic
TWC
2008
109views more  TWC 2008»
14 years 10 months ago
Using the physical layer for wireless authentication in time-variant channels
Abstract--The wireless medium contains domain-specific information that can be used to complement and enhance traditional security mechanisms. In this paper we propose ways to expl...
Liang Xiao, Larry J. Greenstein, Narayan B. Manday...
COMPSEC
2004
95views more  COMPSEC 2004»
14 years 10 months ago
Cumulative notarization for long-term preservation of digital signatures
The long-term preservation of digitally signed documents may be approached and analyzed from various perspectives, i.e. future data readability, signature validity, storage media ...
Dimitrios Lekkas, Dimitris Gritzalis
75
Voted
CORR
2002
Springer
74views Education» more  CORR 2002»
14 years 10 months ago
A logical reconstruction of SPKI
SPKI/SDSI is a proposed public key infrastructure standard that incorporates the SDSI public key infrastructure. SDSI's key innovation was the use of local names. We previous...
Joseph Y. Halpern, Ron van der Meyden