Sciweavers

4340 search results - page 7 / 868
» Formal Methods and Cryptography
Sort
View
CCS
2005
ACM
15 years 7 months ago
Provable anonymity
This paper provides a formal framework for the analysis of information hiding properties of anonymous communication protocols in terms of epistemic logic. The key ingredient is ou...
Flavio D. Garcia, Ichiro Hasuo, Wolter Pieters, Pe...
PKC
2009
Springer
240views Cryptology» more  PKC 2009»
16 years 2 months ago
Distributed Public-Key Cryptography from Weak Secrets
Abstract.We introduce the notion of distributed password-based publickey cryptography, where a virtual high-entropy private key is implicitly dened as a concatenation of low-entrop...
Céline Chevalier, David Pointcheval, Michel...
200
Voted
TFM
2009
Springer
292views Formal Methods» more  TFM 2009»
15 years 8 months ago
Teaching Formal Methods Based on Rewriting Logic and Maude
Peter Csaba Ölveczky
163
Voted
FM
1998
Springer
345views Formal Methods» more  FM 1998»
15 years 6 months ago
Enriching the Software Development Process by Formal Methods
Manfred Broy, Oscar Slotosch