Sciweavers

4340 search results - page 183 / 868
» Formal Methods and Cryptography
Sort
View
JCP
2008
116views more  JCP 2008»
15 years 4 months ago
Formal Verification and Visualization of Security Policies
Verified and validated security policies are essential components of high assurance computer systems. The design and implementation of security policies are fundamental processes i...
Luay A. Wahsheh, Daniel Conte de Leon, Jim Alves-F...
IS
2007
15 years 4 months ago
Formalizing the evolution of virtual communities
Collaboration increasingly takes place in virtual communities using the Internet. These communities are socio-technical systems that tend to evolve strongly and become more comple...
Aldo de Moor, Hans Weigand
ICST
2009
IEEE
15 years 2 months ago
Putting Formal Specifications under the Magnifying Glass: Model-based Testing for Validation
A software development process is conceptually an abstract form of model transformation, starting from an enduser model of requirements, through to a system model for which code c...
Emine G. Aydal, Richard F. Paige, Mark Utting, Jim...
111
Voted
ICASSP
2011
IEEE
14 years 8 months ago
Improving text-independent phonetic segmentation based on the Microcanonical Multiscale Formalism
In an earlier work, we proposed a novel phonetic segmentation method based on speech analysis under the Microcanonical Multiscale Formalism (MMF). The latter relies on the computa...
Vahid Khanagha, Khalid Daoudi, Oriol Pont, Hussein...
119
Voted
PKC
2004
Springer
112views Cryptology» more  PKC 2004»
15 years 9 months ago
Identity-Based Threshold Decryption
Abstract. In this paper, we examine issues related to the construction of identity-based threshold decryption schemes and argue that it is important in practice to design an identi...
Joonsang Baek, Yuliang Zheng