Sciweavers

7720 search results - page 145 / 1544
» A Model for Interface Groups
Sort
View
JAR
2006
107views more  JAR 2006»
15 years 4 months ago
Attacking Group Protocols by Refuting Incorrect Inductive Conjectures
Automated tools for finding attacks on flawed security protocols often fail to quately with group protocols. This is because the abstractions made to improve performance on fixed ...
Graham Steel, Alan Bundy
CCS
2001
ACM
15 years 9 months ago
Practical forward secure group signature schemes
A group signature scheme allows a group member to sign messages anonymously on behalf of the group, while in case of a dispute, a designated entity can reveal the identity of a si...
Dawn Xiaodong Song
ECAL
2007
Springer
15 years 8 months ago
Group Size Effects on the Emergence of Compositional Structures in Language
This paper presents computer simulations which investigate the effect that different group sizes have on the emergence of compositional structures in languages. The simulations are...
Paul Vogt
IUI
2004
ACM
15 years 10 months ago
Computer algebra in interface design research
Tools to design, analyse and evaluate user interfaces can be used in user interface design research and in interface modelling research. This demonstration shows two working syste...
Harold W. Thimbleby, Jeremy Gow
CSFW
2009
IEEE
15 years 11 months ago
Decidable Analysis for a Class of Cryptographic Group Protocols with Unbounded Lists
Cryptographic protocols are crucial for securing electronic transactions. The confidence in these protocols can be increased by the formal analysis of their security properties. ...
Najah Chridi, Mathieu Turuani, Michaël Rusino...