Sciweavers

669 search results - page 53 / 134
» Mastering the Master Theorem
Sort
View
ACMICEC
2003
ACM
118views ECommerce» more  ACMICEC 2003»
15 years 3 months ago
Visualization of EDI messages: facing the problems in the use of XML
Multi-organizational EDI message networks are complicated communication environments with various standards and technologies. The role of third party message exchange hubs has bec...
Reija Korhonen, Airi Salminen
ASIACRYPT
2003
Springer
15 years 1 months ago
Certificateless Public Key Cryptography
This paper introduces the concept of certificateless public key cryptography (CL-PKC). In contrast to traditional public key cryptographic systems, CL-PKC does not require the use...
Sattam S. Al-Riyami, Kenneth G. Paterson
ASIACRYPT
2008
Springer
14 years 12 months ago
A Modular Security Analysis of the TLS Handshake Protocol
We study the security of the widely deployed Secure Session Layer/Transport Layer Security (TLS) key agreement protocol. Our analysis identifies, justifies, and exploits the modul...
Paul Morrissey, Nigel P. Smart, Bogdan Warinschi
APAL
2002
101views more  APAL 2002»
14 years 9 months ago
The logic of tasks
The paper introduces a semantics for the language of classical first order logic supplemented with the additional operators and . This semantics understands formulas as tasks. An ...
Giorgi Japaridze
ACTA
1998
81views more  ACTA 1998»
14 years 9 months ago
Dijkstra-Scholten Predicate Calculus: Concepts and Misconceptions
The paper focusses on the logical backgrounds of the Dijkstra-Scholten program development style for correct programs. For proving the correctness of a program (i.e. the fact that...
Lex Bijlsma, Rob Nederpelt