Sciweavers

8828 search results - page 203 / 1766
» Formal methods in practice
Sort
View
CLA
2004
15 years 6 months ago
Ontology Design with Formal Concept Analysis
Ontologies, often defined as an explicit specification of conceptualization, are necessary for knowledge representation and knowledge exchange. Usually this means that ontology des...
Marek Obitko, Václav Snásel, Jan Smi...
JOC
2007
129views more  JOC 2007»
15 years 4 months ago
Formal Proofs for the Security of Signcryption
Signcryption is a public key or asymmetric cryptographic method that provides simultaneously both message confidentiality and unforgeability at a lower computational and communica...
Joonsang Baek, Ron Steinfeld, Yuliang Zheng
COMPSAC
2009
IEEE
15 years 11 months ago
Towards Validating Security Protocol Deployment in the Wild
As computing technology becomes increasingly pervasive and interconnected, mobility leads to shorter-lasting relationships between end-points with many different security requirem...
Luca Compagna, Ulrich Flegel, Volkmar Lotz
ICDE
2007
IEEE
198views Database» more  ICDE 2007»
16 years 6 months ago
Worst-Case Background Knowledge for Privacy-Preserving Data Publishing
Recent work has shown the necessity of considering an attacker's background knowledge when reasoning about privacy in data publishing. However, in practice, the data publishe...
David J. Martin, Daniel Kifer, Ashwin Machanavajjh...
159
Voted
CAV
2009
Springer
176views Hardware» more  CAV 2009»
16 years 5 months ago
PAT: Towards Flexible Verification under Fairness
Recent development on distributed systems has shown that a variety of fairness constraints (some of which are only recently defined) play vital roles in designing self-stabilizing ...
Jun Sun 0001, Yang Liu 0003, Jin Song Dong, Jun Pa...