Email List Services (or simply, mailing lists) are becoming increasingly common for collaborative computing. In order to enable their use for official purposes with increased effe...
In cryptographic protocols, zero knowledge proofs are employed for a principal A to communicate some non-trivial information t to B while at the same time ensuring that B cannot de...
This paper is focused on algorithmic issues for biometric face verification (i.e., given an image of the face and an identity claim, decide whether they correspond to each other o...
Javier Ortega-Garcia, Joaquin Gonzalez-Rodriguez, ...
We present a formal verification methodology that we have used on a computer system design project. The methodology integrates a temporal logic model checker with a conventional pr...
This article introduces a fully automated verification technique that permits to analyze real-time systems described using a continuous notion of time and a mixture of operational...