Sciweavers

6054 search results - page 1000 / 1211
» Implementation of Andorra-based Languages
Sort
View
ICALP
2005
Springer
15 years 10 months ago
Password-Based Encryption Analyzed
Abstract. The use of passwords in security protocols is particularly delicate because of the possibility of off-line guessing attacks. We study password-based protocols in the cont...
Martín Abadi, Bogdan Warinschi
ICALP
2005
Springer
15 years 10 months ago
Basing Cryptographic Protocols on Tamper-Evident Seals
Abstract. In this paper we attempt to formally study two very intuitive physical models: sealed envelopes and locked boxes, often used as illustrations for common cryptographic ope...
Tal Moran, Moni Naor
ICLP
2005
Springer
15 years 10 months ago
Polynomial Interpretations as a Basis for Termination Analysis of Logic Programs
Our goal is to study the feasibility of porting termination analysis techniques developed for one programming paradigm to another paradigm. In this paper, we show how to adapt ter...
Manh Thang Nguyen, Danny De Schreye
ICMI
2005
Springer
193views Biometrics» more  ICMI 2005»
15 years 10 months ago
Augmenting conversational dialogue by means of latent semantic googling
This paper presents Latent Semantic Googling, a variant of Landauer’s Latent Semantic Indexing that uses the Google search engine to judge the semantic closeness of sets of word...
Robin Senior, Roel Vertegaal
ISW
2005
Springer
15 years 10 months ago
Evaluating Access Control Policies Through Model Checking
We present a model-checking algorithm which can be used to evaluate access control policies, and a tool which implements it. The evaluation includes not only assessing whether the ...
Nan Zhang 0003, Mark Ryan, Dimitar P. Guelev
« Prev « First page 1000 / 1211 Last » Next »