Abstract. We present a series of protocols for authenticating an individual’s membership in a group without revealing that individual’s identity and without restricting how the...
Stuart E. Schechter, Todd Parnell, Alexander J. Ha...
A key element of any mobile code based distributed system are the security mechanisms available to protect (a) the host against potentially hostile actions of a code fragment under...
We report on an experiment to implement an autonomous creature situated in a two-dimensional world, that shows various learning and problem-solving capabilities, within the Societ...
We address in this paper a problem of autonomous agents performing in a common environment where each agent has its goal to achieve before a given deadline. Agents must be able to...
We present an approach for the design and analysis of an electronic voting machine based on a novel combination of formal verification and systematic testing. The system was desig...
Cynthia Sturton, Susmit Jha, Sanjit A. Seshia, Dav...