Sciweavers

1638 search results - page 6 / 328
» Properties of input-consuming derivations
Sort
View
ASWEC
2005
IEEE
15 years 3 months ago
Deriving Systems Level Security Properties of Component Based Composite Systems
This paper proposes an approach of defining systemslevel security properties of component-based composite systems. It argues that the security properties of a composite system ca...
Khaled M. Khan, Jun Han
SPLC
2004
14 years 11 months ago
Experiences in Software Product Families: Problems and Issues During Product Derivation
A fundamental reason for investing in product families is to minimize the application engineering costs. Several organizations that employ product families, however, are becoming i...
Sybren Deelstra, Marco Sinnema, Jan Bosch
CTRSA
2011
Springer
189views Cryptology» more  CTRSA 2011»
14 years 1 months ago
Ideal Key Derivation and Encryption in Simulation-Based Security
Abstract. Many real-world protocols, such as SSL/TLS, SSH, IPsec, IEEE 802.11i, DNSSEC, and Kerberos, derive new keys from other keys. To be able to analyze such protocols in a com...
Ralf Küsters, Max Tuengerthal
IWVF
2001
Springer
15 years 2 months ago
Global Topological Properties of Images Derived from Local Curvature Features
Erhardt Barth, Mario Ferraro, Christoph Zetzsche