Sciweavers

4340 search results - page 112 / 868
» Formal Methods and Cryptography
Sort
View
ESORICS
2004
Springer
15 years 9 months ago
A Formalization of Anonymity and Onion Routing
The use of formal methods to verify security protocols with respect to secrecy and authentication has become standard practice. In contrast, the formalization of other security goa...
Sjouke Mauw, Jan Verschuren, Erik P. de Vink
CONCUR
1999
Springer
15 years 8 months ago
Testing Concurrent Systems: A Formal Approach
This paper discusses the use of formal methods in testing of concurrent systems. It is argued that formal methods and testing can be mutually profitable and useful. A framework fo...
Jan Tretmans
EKAW
2006
Springer
15 years 7 months ago
From Natural Language to Formal Proof Goal
Guidelines (Extended abstract) Ruud Stegers1 , Annette ten Teije1 , and Frank van Harmelen1 Vrije Universiteit, Amsterdam The main problem encountered when starting verification of...
Ruud Stegers, Annette ten Teije, Frank van Harmele...
INFORMATICALT
2000
81views more  INFORMATICALT 2000»
15 years 3 months ago
A New Redundancy Reducing Cipher
This paper discusses a known-plaintext attack on a redundancy reducing cipher method which is proposed by Wayner. We also propose an extension of Wayner's redundancy reducing ...
Min-Shiang Hwang
WWW
2004
ACM
16 years 4 months ago
A method for modeling uncertainty in semantic web taxonomies
We present a method for representing and reasoning with uncertainty in RDF(S) and OWL ontologies based on Bayesian networks. Categories and Subject Descriptors: I.2.4 Artificial I...
Eero Hyvönen, Markus Holi