Sciweavers

3115 search results - page 560 / 623
» Synthesizing Secure Protocols
Sort
View
COMCOM
2006
75views more  COMCOM 2006»
15 years 4 months ago
SSL/TLS session-aware user authentication - Or how to effectively thwart the man-in-the-middle
Abstract. Man-in-the-middle attacks pose a serious threat to SSL/TLSbased electronic commerce applications, such as Internet banking. In this paper, we argue that most deployed use...
Rolf Oppliger, Ralf Hauser, David A. Basin
ECRA
2007
69views more  ECRA 2007»
15 years 4 months ago
NetPay: An off-line, decentralized micro-payment system for thin-client applications
Micro-payment systems have become popular in recent times as the desire to support low-value, high-volume transactions of text, music, clip-art, video and other media has increase...
Xiaoling Dai, John C. Grundy
151
Voted
SIGMETRICS
2008
ACM
130views Hardware» more  SIGMETRICS 2008»
15 years 4 months ago
Using probabilistic model checking in systems biology
Probabilistic model checking is a formal verification framework for systems which exhibit stochastic behaviour. It has been successfully applied to a wide range of domains, includ...
Marta Z. Kwiatkowska, Gethin Norman, David Parker
147
Voted
COMCOM
2002
189views more  COMCOM 2002»
15 years 4 months ago
Intrusion detection techniques and approaches
Recent security incidents and analysis have demonstrated that manual response to such attacks is no longer feasible. Intrusion Detection systems offer techniques for modelling and...
Theuns Verwoerd, Ray Hunt
CCR
1999
110views more  CCR 1999»
15 years 3 months ago
Independent active program representation using ASN. 1
act Syntax Notation One (ASN.1) can be used as a common substrate for representing active programs. An active networking framework, using ASN.1 whereby any active network solution ...
Brad Williamson, Craig Farrell