Sciweavers

2043 search results - page 253 / 409
» Reasoning About Security Models
Sort
View
143
Voted
LICS
2012
IEEE
13 years 3 months ago
Logics of Dynamical Systems
—We study the logic of dynamical systems, that is, logics and proof principles for properties of dynamical systems. Dynamical systems are mathematical models describing how the s...
André Platzer
117
Voted
DRM
2005
Springer
15 years 6 months ago
Towards a software architecture for DRM
The domain of digital rights management (DRM) is currently lacking a generic architecture that supports interoperability and reuse of specific DRM technologies. This lack of arch...
Sam Michiels, Kristof Verslype, Wouter Joosen, Bar...
POPL
2000
ACM
15 years 5 months ago
Authentication Primitives and Their Compilation
Adopting a programming-language perspective, we study the problem of implementing authentication in a distributed system. We define a process calculus with constructs for authent...
Martín Abadi, Cédric Fournet, George...
136
Voted
JOC
2007
133views more  JOC 2007»
15 years 27 days ago
Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication
In the security chain the weakest link is definitely the human one: human beings cannot remember long secrets and often resort to rather insecure solutions to keep track of their ...
Dario Catalano, David Pointcheval, Thomas Pornin
AAAI
1996
15 years 2 months ago
An Optimal Contracting Strategy in a Digital Library
Agents can benefit from contracting some of their tasks that cannot be performedby themselves or that can be performed moreefficiently by other agents. Developing an agent's ...
Sunju Park, Edmund H. Durfee