Sciweavers

3811 search results - page 62 / 763
» The Safe-Tcl Security Model
Sort
View
ATAL
2011
Springer
13 years 12 months ago
Improved computational models of human behavior in security games
Rong Yang, Christopher Kiekintveld, Fernando Ord&o...
PKC
2012
Springer
182views Cryptology» more  PKC 2012»
13 years 2 months ago
From Selective to Full Security: Semi-generic Transformations in the Standard Model
Michel Abdalla, Dario Fiore, Vadim Lyubashevsky
ASWEC
2006
IEEE
15 years 6 months ago
Formal Verification of the IEEE 802.11i WLAN Security Protocol
With the increased usage of wireless LANs (WLANs), businesses and educational institutions are becoming more concerned about wireless network security. The latest WLAN security pr...
Elankayer Sithirasenan, Saad Zafar, Vallipuram Mut...
HIPEAC
2005
Springer
15 years 5 months ago
Memory-Centric Security Architecture
Abstract. This paper presents a new security architecture for protecting software confidentiality and integrity. Different from the previous process-centric systems designed for ...
Weidong Shi, Chenghuai Lu, Hsien-Hsin S. Lee