Sciweavers

90 search results - page 6 / 18
» AnBx - Security Protocols Design and Verification
Sort
View
107
Voted
CSI
2008
75views more  CSI 2008»
15 years 16 days ago
Identity-based universal designated multi-verifiers signature schemes
An identity-based (ID-based) universal designated verifier signature (ID-UDVS) scheme allows a signature holder to designate a specific verifier of the signature by using a simpli...
Seung-Hyun Seo, Jung Yeon Hwang, Kyu Young Choi, D...
98
Voted
SAC
2010
ACM
15 years 19 days ago
Visual processing-inspired fern-audio features for noise-robust speaker verification
In this paper, we consider the problem of speaker verification as a two-class object detection problem in computer vision, where the object instances are 1-D short-time spectral v...
Anindya Roy, Sébastien Marcel
95
Voted
DAC
2002
ACM
16 years 1 months ago
High-Level specification and automatic generation of IP interface monitors
A central problem in functional verification is to check that a circuit block is producing correct outputs while enforcing that the environment is providing legal inputs. To attac...
Marcio T. Oliveira, Alan J. Hu
227
Voted
AMCS
2011
341views Mathematics» more  AMCS 2011»
14 years 7 months ago
FSP and FLTL framework for specification and verification of middle-agents
Agents are a useful abstraction frequently employed as a basic building block in modeling service, information and resource sharing in global environments. The connecting of reques...
Amelia Badica, Costin Badica
89
Voted
ICSE
2008
IEEE-ACM
16 years 16 days ago
PLURAL: checking protocol compliance under aliasing
Enforcing compliance to API usage protocols is notoriously hard due to possible aliasing of objects through multiple references. In previous work we proposed a sound, modular appr...
Kevin Bierhoff, Jonathan Aldrich