Sciweavers

1284 search results - page 114 / 257
» On Helping and Interactive Proof Systems
Sort
View
FAST
2009
14 years 7 months ago
The Case for Browser Provenance
In our increasingly networked world, web browsers are important applications. Originally an interface tool for accessing distributed documents, browsers have become ubiquitous, in...
Daniel W. Margo, Margo I. Seltzer
CCS
2003
ACM
15 years 3 months ago
Secure protocol composition
This paper continues the program initiated in [5], towards a derivation system for security protocols. The general idea is that complex protocols can be formally derived, starting...
Anupam Datta, Ante Derek, John C. Mitchell, Dusko ...
AI
2007
Springer
14 years 10 months ago
Conservation principles and action schemes in the synthesis of geometric concepts
In this paper a theory for the synthesis of geometric concepts is presented. The theory is focused on a constructive process that synthesizes a function in the geometric domain re...
Luis Alberto Pineda
SP
2008
IEEE
132views Security Privacy» more  SP 2008»
14 years 8 months ago
Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol
e an abstraction of zero-knowledge protocols that is le to a fully mechanized analysis. The abstraction is formalized within the applied pi-calculus using a novel equational theor...
Michael Backes, Matteo Maffei, Dominique Unruh
CHI
2010
ACM
15 years 4 months ago
Curator: a game with a purpose for collection recommendation
Collection recommender systems suggest groups of items that work well as a whole. The interaction effects between items is an important consideration, but the vast space of possib...
Greg Walsh, Jennifer Golbeck