Sciweavers

2979 search results - page 347 / 596
» Modelling secure multiagent systems
Sort
View
CRYPTO
2004
Springer
118views Cryptology» more  CRYPTO 2004»
15 years 10 months ago
Short Group Signatures
ded abstract of this paper is to appear in Advances in Cryptology—CRYPTO 2004, Springer-Verlag. We construct a short group signature scheme. Signatures in our scheme are approxi...
Dan Boneh, Xavier Boyen, Hovav Shacham
144
Voted
WS
2006
ACM
15 years 10 months ago
Proactive security for mobile messaging networks
The interoperability of IM (Instant Messaging) and SMS (Short Messaging Service) networks allows users to seamlessly use a variety of computing devices from desktops to cellular p...
Abhijit Bose, Kang G. Shin
165
Voted
ESORICS
2012
Springer
13 years 7 months ago
Secure Proximity Detection for NFC Devices Based on Ambient Sensor Data
In certain applications, it is important for a remote server to securely determine whether or not two mobile devices are in close physical proximity. In particular, in the context ...
Tzipora Halevi, Di Ma, Nitesh Saxena, Tuo Xiang
ACSAC
2009
IEEE
15 years 11 months ago
An Empirical Approach to Modeling Uncertainty in Intrusion Analysis
: © An Empirical Approach to Modeling Uncertainty in Intrusion Analysis Xinming Ou, Siva Raj Rajagopalan, Sakthiyuvaraja Sakthivelmurugan HP Laboratories HPL-2009-334 intrusion de...
Xinming Ou, Siva Raj Rajagopalan, Sakthiyuvaraja S...
139
Voted
CEEMAS
2003
Springer
15 years 9 months ago
Tailoring an Agent Architecture to a Flexible Platform Suitable for Cooperative Robotics
Flexibility and adaptability are essential properties of intelligent manufacturing systems. However, it is a major challenge to realize these properties and the benefits of a flexi...
Lars Kock Jensen, Yves Demazeau, Bent Bruun Kriste...