Sciweavers

5255 search results - page 261 / 1051
» Formal Methods for Privacy
Sort
View
127
Voted
EUROPKI
2004
Springer
15 years 9 months ago
Using LDAP Directories for Management of PKI Processes
We present a framework for extending the functionality of LDAP servers from their typical use as a public directory in public key infrastructures. In this framework the LDAP server...
Vangelis Karatsiolis, Marcus Lippert, Alexander Wi...
AGENTS
2000
Springer
15 years 8 months ago
Verbal communication: using approximate sound propagation to design an inter-agents communication language
In this paper, we will present a method for generating conversations between human-like agents by proposing specific parameters for inter-agents messages with an approximation of...
Jean-Sébastien Monzani, Daniel Thalmann
CSFW
1999
IEEE
15 years 8 months ago
Decision Procedures for the Analysis of Cryptographic Protocols by Logics of Belief
Belief-logic deductions are used in the analysis of cryptographic protocols. We show a new method to decide such logics. In addition to the familiar BAN logic, it is also applicab...
David Monniaux
ETRICS
2006
15 years 8 months ago
Allowing State Changes in Specifications
Abstract. We provide a static analysis (using both dataflow analysis and theorem proving) to allow state changes within specifications. This can be used for specification languages...
Michael Barnett, David A. Naumann, Wolfram Schulte...
MOC
2010
14 years 11 months ago
Global smooth solution curves using rigorous branch following
In this paper, we present a new method to rigorously compute smooth branches of zeros of nonlinear operators f : Rl1
Jan Bouwe van den Berg, Jean-Philippe Lessard, Kon...