Sciweavers

3811 search results - page 742 / 763
» The Safe-Tcl Security Model
Sort
View
ASIAN
2006
Springer
116views Algorithms» more  ASIAN 2006»
15 years 3 months ago
Secrecy Analysis in Protocol Composition Logic
We present formal proof rules for inductive reasoning about the way that data transmitted on the network remains secret from a malicious attacker. Extending a compositional protoco...
Arnab Roy, Anupam Datta, Ante Derek, John C. Mitch...
CNSR
2004
IEEE
15 years 3 months ago
Trusted Route Discovery with TORA Protocol
An ad-hoc network is formed when a group of wireless nodes pledge to help each other in passing packets based upon a pre-agreed protocol. Temporally Ordered Routing Algorithm (TOR...
Asad Amir Pirzada, Chris McDonald
COOPIS
2004
IEEE
15 years 3 months ago
Learning Classifiers from Semantically Heterogeneous Data
Semantically heterogeneous and distributed data sources are quite common in several application domains such as bioinformatics and security informatics. In such a setting, each dat...
Doina Caragea, Jyotishman Pathak, Vasant Honavar
EUSAI
2004
Springer
15 years 3 months ago
Distance-Based Access Modifiers Applied to Safety in Home Networks
Home networks and the interconnection of home appliances is a classical theme in ubiquitous computing research. Security is a recurring concern, but there is a lack of awareness of...
Kjeld Høyer Mortensen, Kari R. Schougaard, ...
COLT
2006
Springer
15 years 3 months ago
Online Learning with Variable Stage Duration
We consider online learning in repeated decision problems, within the framework of a repeated game against an arbitrary opponent. For repeated matrix games, well known results esta...
Shie Mannor, Nahum Shimkin