Sciweavers

1419 search results - page 76 / 284
» Notes on Formalizing Context
Sort
View
CRYPTO
2001
Springer
155views Cryptology» more  CRYPTO 2001»
15 years 5 months ago
RSA-OAEP Is Secure under the RSA Assumption
Recently Victor Shoup noted that there is a gap in the widely-believed security result of OAEP against adaptive chosen-ciphertext attacks. Moreover, he showed that, presumably, OA...
Eiichiro Fujisaki, Tatsuaki Okamoto, David Pointch...
ACSAC
2001
IEEE
15 years 4 months ago
Why Information Security is Hard-An Economic Perspective
According to one common view, information security comes down to technical measures. Given better access control policy models, formal proofs of cryptographic protocols, approved ...
Ross J. Anderson
120
Voted
SPATIALCOGNITION
2000
Springer
15 years 4 months ago
Schematic Maps for Robot Navigation
An approach to high-level interaction with autonomous robots by means of schematic maps is outlined. Schematic maps are knowledge representation structures to encode qualitative s...
Christian Freksa, Reinhard Moratz, Thomas Barkowsk...
130
Voted
LISP
2000
408views more  LISP 2000»
15 years 13 days ago
Fundamental Concepts in Programming Languages
This paper forms the substance of a course of lectures given at the International Summer School in Computer Programming at Copenhagen in August, 1967. The lectures were originally ...
Christopher Strachey
CAV
2012
Springer
241views Hardware» more  CAV 2012»
13 years 3 months ago
Bma: Visual Tool for Modeling and Analyzing Biological Networks
Abstract. BioModel Analyzer (bma) is a tool for modeling and analyzing biological networks. Designed with a lightweight graphical user interface, the tool facilitates usage for bio...
David Benque, Sam Bourton, Caitlin Cockerton, Byro...