Sciweavers

4340 search results - page 12 / 868
» Formal Methods and Cryptography
Sort
View
99
Voted
TYPES
1995
Springer
15 years 7 months ago
A Constructive Proof of the Heine-Borel Covering Theorem for Formal Reals
Jan Cederquist, Sara Negri
135
Voted
FMICS
2010
Springer
15 years 4 months ago
Practical Issues with Formal Specifications - Lessons Learned from an Industrial Case Study
Michael Altenhofen, Achim D. Brucker
119
Voted
FMICS
2010
Springer
15 years 4 months ago
Formal Analysis of BPMN Models Using Event-B
Jeremy W. Bryans, Wei Wei
206
Voted
NDSS
1997
IEEE
15 years 7 months ago
Distributed Authentication in Kerberos Using Public Key Cryptography
In this work we describe a method for fully distributed authentication using public key cryptography within the Kerberos ticket framework. By distributing most of the authenticati...
Marvin A. Sirbu, John C.-I. Chuang
101
Voted
SAS
2009
Springer
137views Formal Methods» more  SAS 2009»
16 years 4 months ago
Invariant Checking for Programs with Procedure Calls
Guillem Godoy, Ashish Tiwari