Sciweavers

1893 search results - page 328 / 379
» Computational composites
Sort
View
EUROCRYPT
1999
Springer
15 years 4 months ago
Proving in Zero-Knowledge that a Number Is the Product of Two Safe Primes
Abstract. We present the first efficient statistical zero-knowledge protocols to prove statements such as: – A committed number is a prime. – A committed (or revealed) number ...
Jan Camenisch, Markus Michels
SIGSOFT
1998
ACM
15 years 4 months ago
Reasoning about Implicit Invocation
Implicit invocation SN92, GN91] has become an important architectural style for large-scale system design and evolution. This paper addresses the lack of speci cation and veri cat...
David Garlan, Somesh Jha, David Notkin
FTRTFT
1998
Springer
15 years 4 months ago
A Modular Visual Model for Hybrid Systems
Visual description techniques are particularly important for the design of hybrid systems because specifications of such systems must usually be discussed between engineers from a ...
Radu Grosu, Thomas Stauner, Manfred Broy
ICMCS
1994
IEEE
123views Multimedia» more  ICMCS 1994»
15 years 4 months ago
Casual Collaboration
As computers are increasingly used to mediate social interaction, tools are needed not only to support direct communication, but also to create a richer social environment for the...
Judith S. Donath
SP
1990
IEEE
15 years 3 months ago
Probabilistic Interference
In recent times information flow and non-interference have become very popular concepts for expressing both integrity and privacy properties. We present the first general definitio...
James W. Gray III