Sciweavers

5722 search results - page 282 / 1145
» Security Function Interactions
Sort
View
OOPSLA
2007
Springer
15 years 9 months ago
Elephant 2000: a programming language based on speech acts
: Elephant 2000 is a vehicle for some ideas about programming language features. We expect these features to be valuable in writing and verifying programs that interact with people...
John McCarthy
CEAS
2008
Springer
15 years 5 months ago
Breaking out of the Browser to Defend Against Phishing Attacks
Current approaches to phishing prevention are focused on the web browser and the user's interaction with it. We present a new approach to allowing users to interact reliably ...
Diana K. Smetters, Paul Stewart
FSE
2010
Springer
153views Cryptology» more  FSE 2010»
15 years 8 months ago
Rotational Cryptanalysis of ARX
In this paper we analyze the security of systems based on modular additions, rotations, and XORs (ARX systems). We provide both theoretical support for their security and practical...
Dmitry Khovratovich, Ivica Nikolic
CSREAEEE
2006
149views Business» more  CSREAEEE 2006»
15 years 4 months ago
ALE Application Framework for Constructing Effective RFID Application
- RFID technology could greatly improve the business efficiency. EPCglobal Network suggests a kind of interface, called ALE (Application Level Events), for an efficient RFID develo...
Kyuhee An, Mokdong Chung
AMC
2005
116views more  AMC 2005»
15 years 3 months ago
The design of integrating subliminal channel with access control
Recently, Lee and Yang proposed a subliminal scheme which employs an access control in a hierarchy. In their scheme, chief users use a one-way hash function to compute their subord...
Narn-Yih Lee, Shu-Ya Yang