Formalising Key-Distribution in the Presence of Trust using Object-Z

نویسنده

  • Benjamin W. Long
چکیده

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

-

In this paper a method for digitally recording four quarter-reference-wave-holograms (by CCD) in a Mach-Zehnder interferometer setup, and reconstructing the object wave-front by numerical method is presented. The terms of direct transmission, auto-correlation and conjugate wave in the four wave reconstruction are cancelled out and only one original object wave is left after overlapping. Reconst...

متن کامل

A New Trust Model for B2C E-Commerce Based on 3D User Interfaces

Lack of trust is one of the key bottle necks in e-commerce development. Nowadays many advanced technologies are trying to address the trust issues in e-commerce. One among them suggests using suitable user interfaces. This paper investigates the functionality and capabilities of 3D graphical user interfaces in regard to trust building in the customers of next generation of B2C e-commerce websit...

متن کامل

Object-z: a Speciication Language Advocated for the Description of Standards

The importance of formalising the speciication of standards has been recognised for a number of years. This paper advocates the use of the formal speciication language Object-Z in the deenition of standards. Object-Z is an extension to the Z language speciically to facilitate speciication in an object-oriented style. First, the syntax and semantics of Object-Z are described informally. Then the...

متن کامل

Object-z: a Specification Language Advocated for the Description of Standards Object-z: a Speciication Language Advocated for the Description of Standards

The importance of formalising the speciication of standards has been recognised for a number of years. This paper advocates the use of the formal speciication language Object-Z in the deenition of standards. Object-Z is an extension to the Z language speciically to facilitate speciication in an object-oriented style. First, the syntax and semantics of Object-Z are described informally. Then the...

متن کامل

Random Key Pre-Distribution Techniques against Sybil Attacks

Sybil attacks pose a serious threat for Wireless Sensor Networks (WSN) security. They can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. In a Sybil attack, the attacker masquerades as multiple sensor identities that are actually controlled by one or a few existing attacker nodes. Sybil identities are fabricated out of stolen keys, obt...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003