Sciweavers

507 search results - page 34 / 102
» The relation between protocols and games
Sort
View
IV
2009
IEEE
107views Visualization» more  IV 2009»
15 years 4 months ago
Multiscale Visual Analysis of Lexical Networks
A lexical network is a very useful resource for natural language processing systems. However, building high quality lexical networks is a complex task. “Jeux de mots” is a web...
Guillaume Artignan, Mountaz Hascoët, Mathieu ...
ATAL
2008
Springer
14 years 11 months ago
Discovering tactical behavior patterns supported by topological structures in soccer agent domains
Behaviors in soccer-agent domains can involve individual plays, several players involved in tactical plays or the whole team trying to follow strategies supported by specific form...
Fernando Ramos, Huberto Ayanegui
COMCOM
2002
105views more  COMCOM 2002»
14 years 9 months ago
An intensive survey of fair non-repudiation protocols
With the phenomenal growth of the Internet and open networks in general, security services, such as non-repudiation, become crucial to many applications. Nonrepudiation services m...
Steve Kremer, Olivier Markowitch, Jianying Zhou
ISW
2004
Springer
15 years 3 months ago
Re-thinking Security in IP Based Micro-Mobility
Security problems in micro-mobility are mostly related to trust establishment between mobile nodes and middle-boxes, i.e. mobile anchor points. In this paper, we present a secure m...
Jukka Ylitalo, Jan Melén, Pekka Nikander, V...
ACNS
2009
Springer
168views Cryptology» more  ACNS 2009»
15 years 4 months ago
Session-state Reveal Is Stronger Than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange Protocol
Abstract. In the paper “Stronger Security of Authenticated Key Exchange” [1,2], a new security model for authenticated key exchange protocols (eCK) is proposed. The new model i...
Cas J. F. Cremers