Sciweavers

180 search results - page 25 / 36
» Verifying Security Properties of Cryptoprotocols: A Novel Ap...
Sort
View
JCS
2010
135views more  JCS 2010»
14 years 10 months ago
New filtering approaches for phishing email
Phishing emails usually contain a message from a credible looking source requesting a user to click a link to a website where she/he is asked to enter a password or other confide...
André Bergholz, Jan De Beer, Sebastian Glah...
ICIP
2009
IEEE
16 years 22 days ago
Poisson-haar Transform: A Nonlinear Multiscale Representation For Photon-limited Image Denoising
We present a novel multiscale image representation belonging to the class of multiscale multiplicative decompositions, which we term Poisson-Haar transform. The proposed represent...
CSCWD
2001
Springer
15 years 4 months ago
Verification of XRL: An XML-based Workflow Language
XRL (eXchangeable Routing Language) is an instancebased workflow language that uses XML for the representation of process definitions and Petri nets for its semantics. Since XRL i...
Wil M. P. van der Aalst, H. M. W. Verbeek, A. Kuma...
ICS
2010
Tsinghua U.
15 years 9 months ago
Proof-Carrying Data and Hearsay Arguments from Signature Cards
: Design of secure systems can often be expressed as ensuring that some property is maintained at every step of a distributed computation among mutually-untrusting parties. Special...
Alessandro Chiesa, Eran Tromer
ASIACRYPT
2009
Springer
15 years 6 months ago
A Modular Design for Hash Functions: Towards Making the Mix-Compress-Mix Approach Practical
The design of cryptographic hash functions is a very complex and failure-prone process. For this reason, this paper puts forward a completely modular and fault-tolerant approach to...
Anja Lehmann, Stefano Tessaro