Sciweavers

797 search results - page 71 / 160
» Observing Success in the Pi-Calculus
Sort
View
HICSS
2009
IEEE
100views Biometrics» more  HICSS 2009»
15 years 4 months ago
A Theoretical Framework for Assessing Eavesdropping-Resistant Authentication Interfaces
A simple theoretical framework is developed to evaluate the security and usability of eavesdroppingresistant authentication schemes. Such schemes strive to allow users to authenti...
Bogdan Hoanca, Kenrick J. Mock
SAC
2009
ACM
15 years 4 months ago
A passive conformance testing approach for a MANET routing protocol
In this paper we propose a passive conformance testing technique applied to a Mobile ad hoc network (MANET) routing protocol, OLSR, that is characterized by a dynamically changing...
Ana R. Cavalli, Stéphane Maag, Edgardo Mont...
CCS
2009
ACM
15 years 4 months ago
Computational soundness for key exchange protocols with symmetric encryption
Formal analysis of security protocols based on symbolic models has been very successful in finding flaws in published protocols and proving protocols secure, using automated too...
Ralf Küsters, Max Tuengerthal
CSE
2009
IEEE
15 years 4 months ago
Feedback Loops of Attention in Peer Production
—A significant percentage of online content is now published and consumed via the mechanism of crowdsourcing. While any user can contribute to these forums, a disproportionately...
Fang Wu, Dennis M. Wilkinson, Bernardo A. Huberman
CSE
2009
IEEE
15 years 4 months ago
Information Retrieval in Wikis Using an Ontology
This article addresses a question regarding relevant information in a social media such as a wiki that can contain huge amount of text, written in slang or in natural language, wi...
Carlos Miguel Tobar, Alessandro Santos Germer, Jua...