Sciweavers

4340 search results - page 84 / 868
» Formal Methods and Cryptography
Sort
View
108
Voted
AGTIVE
2003
Springer
15 years 9 months ago
Proper Down-Coloring Simple Acyclic Digraphs
Geir Agnarsson, Ágúst S. Egilsson, M...
122
Voted
TSE
2002
125views more  TSE 2002»
15 years 3 months ago
An Automated Verification Method for Distributed Systems Software Based on Model Extraction
Gerard J. Holzmann, Margaret H. Smith
132
Voted
FLAIRS
2006
15 years 5 months ago
Evaluation of the q-matrix Method in Understanding Student Logic Proofs
In building intelligent tutoring systems, it is critical to be able to understand and diagnose student responses in interactive problem solving. We present a novel application of ...
Tiffany Barnes
138
Voted
FC
2006
Springer
147views Cryptology» more  FC 2006»
15 years 7 months ago
Timed-Release and Key-Insulated Public Key Encryption
In this paper we consider two security notions related to Identity Based Encryption: Key-insulated public key encryption, introduced by Dodis, Katz, Xu and Yung; and Timed-Release ...
Jung Hee Cheon, Nicholas Hopper, Yongdae Kim, Ivan...
146
Voted
CSFW
2011
IEEE
14 years 3 months ago
Security for Key Management Interfaces
—We propose a much-needed formal definition of security for cryptographic key management APIs. The advantages of our definition are that it is general, intuitive, and applicabl...
Steve Kremer, Graham Steel, Bogdan Warinschi