Sciweavers

2213 search results - page 112 / 443
» Software Security
Sort
View
AAAI
1994
15 years 4 months ago
An Experiment in the Design of Software Agents
We describe a bottom-up approach to the design of software agents. We built and tested an agent system that addresses the real-world problem of handling the activities involved in...
Henry A. Kautz, Bart Selman, Michael H. Coen, Stev...
SOCIALCOM
2010
15 years 1 months ago
Secure Wireless Embedded Systems Via Component-based Design
This paper introduces the method secure-by-design as a way of constructing wireless embedded systems using component-based modeling frameworks. This facilitates design of secure a...
Theis Hjorth, Rune Torbensen
133
Voted
WIAS
2010
102views more  WIAS 2010»
15 years 1 months ago
Information security underlying transparent computing: Impacts, visions and challenges
The rapid development of computer network technologies and social informationalization has brought many new opportunities and challenges in information security. With improved info...
Yaoxue Zhang, Laurence Tianruo Yang, Yuezhi Zhou, ...
FC
2000
Springer
83views Cryptology» more  FC 2000»
15 years 7 months ago
Secret Key Authentication with Software-Only Verification
Abstract Two protocols for authentication based on symmetric key cryptography are described, where the verifier can be implemented in software completely, without the need for secu...
Jaap-Henk Hoepman
AGENTS
1999
Springer
15 years 7 months ago
A Catalog of Agent Coordination Patterns
This paper surveys the current state of the art in agentoriented software engineering, focusing on the area of coordinated multi-agent systems. In multi-agent systems, the interac...
Sandra C. Hayden, Christina Carrick, Qiang Yang