Sciweavers

1302 search results - page 206 / 261
» Soundness in the Public-Key Model
Sort
View
ASIAN
2007
Springer
126views Algorithms» more  ASIAN 2007»
15 years 6 months ago
Computational Semantics for Basic Protocol Logic - A Stochastic Approach
Abstract. This paper is concerned about relating formal and computational models of cryptography in case of active adversaries when formal security analysis is done with first ord...
Gergei Bana, Koji Hasebe, Mitsuhiro Okada
CALCO
2007
Springer
88views Mathematics» more  CALCO 2007»
15 years 6 months ago
Datatypes in Memory
Besides functional correctness, specifications must describe other properties of permissible implementations. We want to use simple algebraic techniques to specify resource usage ...
David Aspinall, Piotr Hoffman
ESORICS
2007
Springer
15 years 6 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
PKDD
2007
Springer
114views Data Mining» more  PKDD 2007»
15 years 6 months ago
Robust Visual Mining of Data with Error Information
Abstract. Recent results on robust density-based clustering have indicated that the uncertainty associated with the actual measurements can be exploited to locate objects that are ...
Jianyong Sun, Ata Kabán, Somak Raychaudhury
SCALESPACE
2007
Springer
15 years 6 months ago
A Consistent Spatio-temporal Motion Estimator for Atmospheric Layers
In this paper, we address the problem of estimating mesoscale dynamics of atmospheric layers from satellite image sequences. Relying on a physically sound vertical decomposition of...
Patrick Héas, Étienne Mémin, ...