Sciweavers

2233 search results - page 142 / 447
» Modular type classes
Sort
View
EUROCRYPT
2001
Springer
15 years 7 months ago
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
Abstract. We present a formalism for the analysis of key-exchange protocols that combines previous definitional approaches and results in a definition of security that enjoys som...
Ran Canetti, Hugo Krawczyk
LOPSTR
2001
Springer
15 years 7 months ago
Proof Theory, Transformations, and Logic Programming for Debugging Security Protocols
In this paper we define a sequent calculus to formally specify, simulate, debug and verify security protocols. In our sequents we distinguish between the current knowledge of prin...
Giorgio Delzanno, Sandro Etalle
ASPLOS
2000
ACM
15 years 7 months ago
System Architecture Directions for Networked Sensors
Technological progress in integrated, low-power, CMOS communication devices and sensors makes a rich design space of networked sensors viable. They can be deeply embedded in the p...
Jason L. Hill, Robert Szewczyk, Alec Woo, Seth Hol...
131
Voted
CRYPTO
1993
Springer
131views Cryptology» more  CRYPTO 1993»
15 years 6 months ago
Hash Functions Based on Block Ciphers: A Synthetic Approach
Constructions for hash functions based on a block cipher are studied where the size of the hashcode is equal to the block length of the block cipher and where the key size is appro...
Bart Preneel, René Govaerts, Joos Vandewall...
139
Voted
LION
2010
Springer
239views Optimization» more  LION 2010»
15 years 6 months ago
The EvA2 Optimization Framework
Abstract. We present EvA2, a comprehensive metaheuristic optimization framework with emphasis on Evolutionary Algorithms. It presents a modular structure of interfaces and abstract...
Marcel Kronfeld, Hannes Planatscher, Andreas Zell