Sciweavers

4340 search results - page 194 / 868
» Formal Methods and Cryptography
Sort
View
ISPA
2005
Springer
15 years 10 months ago
Hybrid Authentication and Key Management Scheme for WSANs
:Wireless Sensor and Actor Networks (WSANs) consist of three types of nodes with different capabilities and functions. Because of these heterogeneities, current network security ...
Xiaomei Cao, Mao Lin Huang, YueQuan Chen, Guihai C...
EUROCRYPT
2001
Springer
15 years 9 months ago
Finding Secure Curves with the Satoh-FGH Algorithm and an Early-Abort Strategy
The use of elliptic curves in cryptography relies on the ability to count the number of points on a given curve. Before 1999, the SEA algorithm was the only efficient method known ...
Mireille Fouquet, Pierrick Gaudry, Robert Harley
FBT
1997
15 years 5 months ago
Rapid Prototyping with AutoFocus
Abstract: In most cases, it is simple inconvenience of use that keeps formal methods from being put to industrial use. This paper argues that functionalities, even though of simple...
Franz Huber, Bernhard Schätz
SAS
1993
Springer
126views Formal Methods» more  SAS 1993»
15 years 8 months ago
Finiteness Conditions for Strictness Analysis
We give upper bounds on the number of times the fixed point operator needs to be unfolded for strictness analysis of functional languages with lists. This extends previous work b...
Flemming Nielson, Hanne Riis Nielson
CAISE
2005
Springer
15 years 10 months ago
The Logic of Correctness in Software Engineering
Abstract. This paper uses a framework drawn from work in the philosophy of science to characterize the concepts of program correctness that have been used in software engineering, ...
Mark Priestly