Sciweavers

1748 search results - page 121 / 350
» Security Models for Heterogeneous Networking
Sort
View
DANCE
2002
IEEE
15 years 8 months ago
Developing Dynamic Security Policies
In this paper we define and provide a general construction for a class of policies we call dynamic policies. In most existing systems, policies are implemented and enforced by ch...
Prasad Naldurg, Roy H. Campbell, M. Dennis Mickuna...
217
Voted
NIPS
2004
15 years 5 months ago
Synchronization of neural networks by mutual learning and its application to cryptography
Two neural networks that are trained on their mutual output synchronize to an identical time dependant weight vector. This novel phenomenon can be used for creation of a secure cr...
Einat Klein, Rachel Mislovaty, Ido Kanter, Andreas...
162
Voted
ICPADS
1996
IEEE
15 years 7 months ago
Implementation of MAP: A system for mobile assistant programming
We have de ne a network programming model called Mobile Assistant Programming (MAP) for development and execution of communication applications in large scale networks of heteroge...
Stéphane Perret, Andrzej Duda
ISCC
1999
IEEE
111views Communications» more  ISCC 1999»
15 years 8 months ago
Structure and Performance Evaluation of a Replicated Banyan Network Based ATM Switch
Banyan networks are commonly used as interconnection structures in ATM switches. This paper is concerned with the replication technique which was applied to the standard banyan ne...
Moustafa A. Youssef, Mohamed N. El-Derini, Hussein...
128
Voted
ASWEC
2006
IEEE
15 years 9 months ago
Formally Analysing a Security Protocol for Replay Attacks
The Kerberos-One-Time protocol is a key distribution protocol promoted for use with Javacards to provide secure communication over the GSM mobile phone network. From inspection we...
Benjamin W. Long, Colin J. Fidge