Sciweavers

1843 search results - page 46 / 369
» Securing Class Initialization
Sort
View
PROVSEC
2007
Springer
15 years 8 months ago
Stronger Security of Authenticated Key Exchange
In this paper we study security definitions for authenticated key exchange (AKE) protocols. We observe that there are several families of attacks on AKE protocols that lie outsid...
Brian A. LaMacchia, Kristin Lauter, Anton Mityagin
ICIAR
2004
Springer
15 years 7 months ago
Learning an Information Theoretic Transform for Object Detection
We present an information theoretic approach for learning a linear dimension reduction transform for object classification. The theoretic guidance of the approach is that the trans...
Jianzhong Fang, Guoping Qiu
AISS
2010
242views more  AISS 2010»
14 years 11 months ago
MLSF: A Framework for Multi-Level Secure Composite Web Services
Web services technologies change the software industry drastically by developing and integrating enterprise web services and applications in order to enable the users to access th...
J. G. R. Sathiaseelan, S. Albert Rabara, J. Ronald...
MA
2001
Springer
175views Communications» more  MA 2001»
15 years 6 months ago
Evaluating the Security of Three Java-Based Mobile Agent Systems
Abstract. The goal of mobile agent systems is to provide a distributed computing infrastructure supporting applications whose components can move between different execution enviro...
Sebastian Fischmeister, Giovanni Vigna, Richard A....
APN
2008
Springer
15 years 4 months ago
Modeling and Analysis of Security Protocols Using Role Based Specifications and Petri Nets
Abstract. In this paper, we introduce a framework composed of a syntax and its compositional Petri net semantics, for the specification and verification of properties (like authent...
Roland Bouroulet, Raymond R. Devillers, Hanna Klau...