Results 41 to 50 of about 8,202 (205)
Automatic Methods for Analyzing Non-repudiation Protocole with an Active Intruder [PDF]
International audienceNon-repudiation protocols have an important role in many areas where secured transactions with proofs of participation are necessary.
A. Armando +23 more
core +4 more sources
AVISPA in the Validation of Ambient Intelligence Scenarios
Unión Europea con los proyectos SERENITY (IST- 027587) y OKKAM (IST- 215032) y la Junta de Andalucía con el proyecto ...
Muñoz-Gallego, Antonio Jesús +2 more
openaire +3 more sources
ABSTRACT E‐learning systems in an educational environment designed for wireless area networks for schools, universities, and research institutions provide consistency and better retention for students, professors, and researchers. An E‐learning system is known for storing lecture documents and live video conferences that are transmitted over public ...
Ahmed A. Mawgoud +4 more
wiley +1 more source
Temporal verification in secure group communication system design [PDF]
The paper discusses an experience in using a real-time UML/SysML profile and a formal verification toolkit to check a secure group communication system against temporal requirements.
Fontan, Benjamin +3 more
core +1 more source
De 2017 a 2018 se estudiaron diversas poblaciones de la avispa eusocial Polistes dominula (Christ, 1791) en tres municipios del suroeste de la península ibérica, con la finalidad de identificar las causas de mortalidad de sus colonias.
José Luis Pérez-Bote +1 more
doaj +1 more source
Using the largest georeferenced molecular dataset for ichneumonoid parasitoid wasps, we implemented a macrogenetics approach to examine latitudinal patterns and predictors of intraspecific genetic diversity and explain the global distribution of genetic diversity in this group.
Jessica Castellanos‐Labarcena +2 more
wiley +1 more source
Modeling Adversaries in a Logic for Security Protocol Analysis [PDF]
Logics for security protocol analysis require the formalization of an adversary model that specifies the capabilities of adversaries. A common model is the Dolev-Yao model, which considers only adversaries that can compose and replay messages, and ...
Halpern, Joseph Y., Pucella, Riccardo
core +1 more source
Anatomía y morfogénesis de las agallas producidas por Leptocybe invasa en plantas de Eucalyptus
: Leptocybe invasa o “avispa de la agalla del eucalipto”, es un microhimenóptero gallícola que ovipone en hojas jóvenes de eucaliptos. La planta responde formando agallas, que causan enrollamiento, defoliación y colapso de brotes, afectando seriamente la
Ana M. Gonzalez, Stella M. Solís
doaj +1 more source
LightAuth: A Lightweight Sensor Nodes Authentication Framework for Smart Health System
ABSTRACT Counterfeit medical devices pose a threat to patient safety, necessitating a secure device authentication system for medical applications. Resource‐constrained sensory nodes are vulnerable to hacking, prompting the need for robust security measures.
Zain Ul Islam Adil +5 more
wiley +1 more source
Activity schedule and foraging in Protopolybia sedula (Hymenoptera, Vespidae) [PDF]
Protopolybia sedula is a social swarming wasp, widely spread throughout many countries in the Americas, including most of Brazil. Despite its distribution, studies of its behavioral ecology are scarce. This study aimed to describe its
Barbosa, Bruno Corrêa +4 more
core

