Sciweavers

4340 search results - page 113 / 868
» Formal Methods and Cryptography
Sort
View
ZUM
2005
Springer
142views Formal Methods» more  ZUM 2005»
15 years 9 months ago
Formal Program Development with Approximations
Abstract. We describe a method for combining formal program development with a disciplined and documented way of introducing realistic compromises, for example necessitated by reso...
Eerke A. Boiten, John Derrick
SP
1999
IEEE
155views Security Privacy» more  SP 1999»
15 years 8 months ago
Software Smart Cards via Cryptographic Camouflage
A sensitive point in public key cryptography is how to protect the private key. We outline a method of protecting private keys using cryptographic camouflage. Specifically, we do ...
Douglas N. Hoover, B. N. Kausik
WSC
2007
15 years 6 months ago
An elliptical cryptographic algorithm for RF wireless devices
In this paper, we propose a new asymmetric cryptographic algorithm (HOOD CRYPT) based on the Elliptical Curve Cryptographic approach. The algorithm describes how an orthogonal fre...
Robert Steven Owor, Khalil Dajani, Zephyrinus Okon...
COMPSAC
1997
IEEE
15 years 8 months ago
A Pragmatic Approach to Formalizing Object-Oriented Modeling and Development
Despite recent developments in formal methods, formal methods have yet to enter the mainstream of software industry. In this paper, we first examine the pragmatic obstacles of ma...
Xiaoping Jia
IAT
2008
IEEE
15 years 10 months ago
Understanding Social Networks Using Formal Concept Analysis
Social networks are very popular nowadays and the understanding of their inner structure seems to be promising area. Several approaches for the social network structure visualizat...
Václav Snásel, Zdenek Horak, Ajith A...