Sciweavers

180 search results - page 23 / 36
» Verifying Security Properties of Cryptoprotocols: A Novel Ap...
Sort
View
DBSEC
2000
138views Database» more  DBSEC 2000»
15 years 1 months ago
Discovery of Multi-Level Security Policies
With the increasing complexity and dynamics of database and information systems, it becomes more and more di cult for administrative personnel to identify, specify and enforce sec...
Christina Yip Chung, Michael Gertz, Karl N. Levitt
JUCS
2006
131views more  JUCS 2006»
14 years 11 months ago
Verification of CRWL Programs with Rewriting Logic
Abstract: We present a novel approach to the verification of functional-logic programs. For our verification purposes, equational reasoning is not valid due to the presence of non-...
José Miguel Cleva, Isabel Pita
ROBOTICA
2006
116views more  ROBOTICA 2006»
14 years 11 months ago
Hybrid velocity/force control for robot navigation in compliant unknown environments
We combine a "hybrid" force/position control scheme with a potential field approach into a novel method for collision recovery and navigation in unknown environments. It...
Dushyant Palejiya, Herbert G. Tanner
CSFW
2005
IEEE
15 years 5 months ago
Temporal Rank Functions for Forward Secrecy
A number of key establishment protocols claim the property of forward secrecy, where the compromise of a longterm key does not result in the compromise of previously computed sess...
Rob Delicata, Steve A. Schneider
GLOBECOM
2006
IEEE
15 years 5 months ago
Efficient transmission of MP3 streams over VPNs
— Multimedia applications communicating over a next generation VPN architecture that allows selective encryption can leverage the security properties of a VPN with its performanc...
Shashank Khanvilkar, Ashfaq A. Khokhar