Sciweavers

180 search results - page 19 / 36
» Verifying Security Properties of Cryptoprotocols: A Novel Ap...
Sort
View
COMPSAC
2007
IEEE
14 years 12 months ago
A Connector-Centric Approach to Aspect-Oriented Software Evolution
Lose sight of the existence of system crosscutting concerns, e.g. safety and quality etc, often causes the system hard to maintain and evolve according to the changing environment...
Yiming Lau, Wenyun Zhao, Xin Peng, Shan Tang
ICAS
2005
IEEE
88views Robotics» more  ICAS 2005»
15 years 5 months ago
A New Approach for the Construction of ALM Trees using Layered Coding
— This paper presents a novel approach for efficient tree construction in ALM (Application Layer Multicast) using layered video coding. This system is suitable for the users in h...
Yohei Okada, Masato Oguro, Jiro Katto, Sakae Okubo
SIAMCOMP
2002
90views more  SIAMCOMP 2002»
14 years 11 months ago
A Virtually Synchronous Group Multicast Algorithm for WANs: Formal Approach
This paper presents a formal design for a novel group communication service targeted for WANs. The service provides Virtual Synchrony semantics. Such semantics facilitate the desi...
Idit Keidar, Roger Khazan
ESOP
2010
Springer
15 years 3 months ago
A Semantic Framework for Declassification and Endorsement
Language-based information flow methods offer a principled way to enforce strong security properties, but enforcing noninterference is too inflexible for realistic applications. Se...
Aslan Askarov, Andrew Myers
NDSS
2000
IEEE
15 years 4 months ago
A First Step Towards the Automatic Generation of Security Protocols
This paper describes automatic protocol generation (APG for short), a novel mechanism to generate security protocols automatically. With APG, the protocol designer inputs the spec...
Adrian Perrig, Dawn Xiaodong Song