Sciweavers

4340 search results - page 198 / 868
» Formal Methods and Cryptography
Sort
View
TCC
2005
Springer
108views Cryptology» more  TCC 2005»
15 years 10 months ago
Comparing Two Notions of Simulatability
In this work, relations between the security notions standard simulatability and universal simulatability for cryptographic protocols are investigated. A simulatability-based notio...
Dennis Hofheinz, Dominique Unruh
134
Voted
FAC
2008
80views more  FAC 2008»
15 years 4 months ago
Verification of Mondex electronic purses with KIV: from transactions to a security protocol
The Mondex case study about the specification and refinement of an electronic purse as defined in the Oxford Technical Monograph PRG-126 has recently been proposed as a challenge f...
Dominik Haneberg, Gerhard Schellhorn, Holger Grand...
ZUM
2000
Springer
107views Formal Methods» more  ZUM 2000»
15 years 8 months ago
How to Drive a B Machine
The B-Method is a state-based formal method that describes behaviour in terms of MACHINES whose states change under OPERATIONS. The process algebra CSP is an event-based formalism ...
Helen Treharne, Steve Schneider
SDM
2009
SIAM
180views Data Mining» more  SDM 2009»
16 years 1 months ago
Structure and Dynamics of Research Collaboration in Computer Science.
Complex systems exhibit emergent patterns of behavior at different levels of organization. Powerful network analysis methods, developed in physics and social sciences, have been s...
Andre Nash, Christian Bird, Earl T. Barr, Premkuma...
KCAP
2005
ACM
15 years 10 months ago
Knowledge transformations between frame systems and RDB systems
For decades, researchers in knowledge representation (KR) have argued for and against various choices in KR formalisms, such as Rules, Frames, Semantic nets, and Formal logic. In ...
John H. Gennari, Peter Mork, Hao Li