Sciweavers

1894 search results - page 266 / 379
» A TLA Proof System
Sort
View
BIRTHDAY
2006
Springer
15 years 7 months ago
Research Perspectives for Logic and Deduction
The article is meant to be kind of the author's manifesto for the role of logic and deduction within Intellectics. Based on a brief analysis of this role the paper presents a...
Wolfgang Bibel
122
Voted
DEXAW
2004
IEEE
124views Database» more  DEXAW 2004»
15 years 7 months ago
PAC-MEN: Personal Autonomic Computing Monitoring Environment
The overall goal of this research is to improve the `environment awareness' aspect of personal autonomic computing. Personal Computing offers unique challenges for self-manag...
Roy Sterritt, David F. Bantz
CRYPTO
2006
Springer
224views Cryptology» more  CRYPTO 2006»
15 years 7 months ago
Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
We present an identity-based cryptosystem that features fully anonymous ciphertexts and hierarchical key delegation. We give a proof of security in the standard model, based on the...
Xavier Boyen, Brent Waters
ACSAC
2001
IEEE
15 years 7 months ago
Why Information Security is Hard-An Economic Perspective
According to one common view, information security comes down to technical measures. Given better access control policy models, formal proofs of cryptographic protocols, approved ...
Ross J. Anderson
136
Voted
APLAS
2001
ACM
15 years 7 months ago
Verifying the CPS Transformation in Isabelle/HOL
We verified two versions of the CPS transformation in Isabelle/HOL: one by Plotkin by Danvy and Filinski. We adopted first order abstract syntax so that the formalization is close...
Yasuhiko Minamide, Koji Okuma