Sciweavers

5722 search results - page 71 / 1145
» Security Function Interactions
Sort
View
242
Voted
COMCOM
2000
105views more  COMCOM 2000»
15 years 29 days ago
Security broker for multimedia wireless LANs
To secure interactive multimedia applications in wireless LANs WLANs it is pertinent to implement a number of security services such as authentication, key exchange and real-time e...
Aura Ganz, Se Hyun Park, Zvi Ganz
105
Voted
ICDE
2007
IEEE
145views Database» more  ICDE 2007»
15 years 7 months ago
The Rigorous Implementation of a Fair Exchange Protocol for Non-repudiable Web Service Interactions - a case study
The correct implementation of security protocols is a challenging task. To achieve a high degree of confidence in an implementation, as with any software, ideally one requires bot...
Nick Cook, Paul Robinson, Santosh K. Shrivastava
97
Voted
HAIS
2008
Springer
15 years 2 months ago
Multi-agent System for Management and Monitoring of Routes Surveillance
This paper presents a multi-agent system for security control on industrial environments. The system uses a set of wireless technologies and software agents which integrate reasoni...
Sara Rodríguez, Javier Bajo
ASIACRYPT
2008
Springer
15 years 3 months ago
Limits of Constructive Security Proofs
The collision-resistance of hash functions is an important foundation of many cryptographic protocols. Formally, collision-resistance can only be expected if the hash function in f...
Michael Backes, Dominique Unruh
89
Voted
ESORICS
2007
Springer
15 years 7 months ago
Obligations and Their Interaction with Programs
Obligations are pervasive in modern systems, often linked to access control decisions. We present a very general model of obligations as objects with state, and discuss its interac...
Daniel J. Dougherty, Kathi Fisler, Shriram Krishna...