Sciweavers

844 search results - page 1 / 169
» The strength of multi-row models
Sort
View
CCS
2006
ACM
13 years 8 months ago
Modelling the relative strength of security protocols
In this paper, we present a way to think about the relative strength of security protocols using SoS, a lattice-theoretic representation of security strength. In particular, we di...
Ho Chung, Clifford Neuman
CAV
2012
Springer
222views Hardware» more  CAV 2012»
11 years 7 months ago
Leveraging Interpolant Strength in Model Checking
Craig interpolation is a well known method of abstraction successfully used in both hardware and software model checking. The logical strength of interpolants can affect the quali...
Simone Fulvio Rollini, Ondrej Sery, Natasha Sharyg...
ICWN
2003
13 years 6 months ago
Modeling of WLAN Beacon Signal Strength Measured in an Indoor Environment
: In the fourth generation wireless networks, it is believed that wireless LANs (WLANs) will interwork with cellular systems to provide fast speed data services. The integration of...
Wenhui Zhang
IFIP
2010
Springer
12 years 11 months ago
Modeling Identity-Related Properties and Their Privacy Strength
In the last years several attempts to define identity-related properties such as identifiability, pseudonymity and anonymity have been made to analyze the privacy offered by inform...
Meilof Veeningen, Benne de Weger, Nicola Zannone
JSYML
2008
60views more  JSYML 2008»
13 years 4 months ago
On the consistency strength of the inner model hypothesis
Sy-David Friedman, Philip Welch, W. Hugh Woodin