Sciweavers

741 search results - page 25 / 149
» Verification of security protocols using LOTOS-method and ap...
Sort
View
AVBPA
2001
Springer
117views Biometrics» more  AVBPA 2001»
15 years 8 months ago
Hand Recognition Using Implicit Polynomials and Geometric Features
Person identification and verification using biometric methods is getting more and more important in today’s information society; resulting in increased utilization of systems th...
Cenker Öden, Aytül Erçil, Vedat T...
JSS
2010
111views more  JSS 2010»
15 years 2 months ago
Promoting the development of secure mobile agent applications
In this paper we present a software architecture and a development environment for the implementation of applications based on secure mobile agents. Recent breakthroughs in mobile...
Carles Garrigues, Sergi Robles, Joan Borrell, Guil...
176
Voted
BIOSIG
2009
152views Biometrics» more  BIOSIG 2009»
15 years 1 months ago
A Survey of Distributed Biometric Authentication Systems
: In ACISP'07, Bringer et al proposed a new approach for remote biometric based verification, which consists of a hybrid protocol that distributes the server side functionalit...
Neyire Deniz Sarier
149
Voted
FM
2009
Springer
154views Formal Methods» more  FM 2009»
15 years 1 months ago
Specification and Verification of Web Applications in Rewriting Logic
Abstract. This paper presents a Rewriting Logic framework that formalizes the interactions between Web servers and Web browsers through icating protocol abstracting HTTP. The propo...
María Alpuente, Demis Ballis, Daniel Romero
132
Voted
PLDI
2010
ACM
16 years 1 months ago
Type-preserving Compilation for End-to-end Verification of Security Enforcement
A number of programming languages use rich type systems to verify security properties of code. Some of these languages are meant for source programming, but programs written in th...
Juan Chen, Ravi Chugh, Nikhil Swamy