Sciweavers

2282 search results - page 166 / 457
» Active property checking
Sort
View
IJNSEC
2010
133views more  IJNSEC 2010»
14 years 11 months ago
Verifiable Attribute Based Encryption
In this paper, we construct two verifiable attribute-based encryption (VABE) schemes. One is with a single authority, and the other is with multi authorities. Not only our schemes ...
Qiang Tang, Dongyao Ji
ENTCS
2007
158views more  ENTCS 2007»
15 years 4 months ago
Abstraction and Completeness for Real-Time Maude
ion and Completeness for Real-Time Maude Peter Csaba ¨Olveczky a,b and Jos´e Meseguer b a Department of Informatics, University of Oslo b Department of Computer Science, Universi...
Peter Csaba Ölveczky, José Meseguer
BC
2002
88views more  BC 2002»
15 years 4 months ago
Beyond spike timing: the role of nonlinear plasticity and unreliable synapses
Spike-timing-dependent plasticity (STDP) strengthens synapses that are activated immediately before a postsynaptic spike, and weakens those that are activated after a spike. To pre...
Walter Senn
ESOP
2003
Springer
15 years 10 months ago
On the Secure Implementation of Security Protocols
We consider the problem of implementing a security protocol in such a manner that secrecy of sensitive data is not jeopardized. Implementation is assumed to take place in the cont...
Pablo Giambiagi, Mads Dam
RV
2010
Springer
128views Hardware» more  RV 2010»
15 years 2 months ago
Reducing Configurations to Monitor in a Software Product Line
A product line is a family of programs where each program is defined by a unique combination of features. Product lines, like conventional programs, can be checked for safety prope...
Chang Hwan Peter Kim, Eric Bodden, Don S. Batory, ...