We present a new mechanized prover for secrecy properties of security protocols. In contrast to most previous provers, our tool does not rely on the Dolev-Yao model, but on the co...
Success in today’s marketing arena can often depend on companies embracing effective new technologies and integrating them into their business model. In the computing service su...
We define and study a distributed cryptographic implementation for an asynchronous pi calculus. At the source level, we adapt simple type systems designed for establishing formal ...
ions, and (c) the seductive reality of the computer must not be allowed to supplant construction of models. The dominant theory of learning today is called constructivism. This the...
The Thought-Translation-Device (TTD) is a Brain-ComputerInterface (BCI) that enables completely paralyzed patients to communicate by the use of their brain signals only. Selfregul...