Sciweavers

1662 search results - page 3 / 333
» Privately Finding Specifications
Sort
View
ICFEM
2005
Springer
13 years 12 months ago
Finding Bugs in Network Protocols Using Simulation Code and Protocol-Specific Heuristics
Ahmed Sobeih, Mahesh Viswanathan, Darko Marinov, J...
SP
1999
IEEE
155views Security Privacy» more  SP 1999»
13 years 10 months ago
Software Smart Cards via Cryptographic Camouflage
A sensitive point in public key cryptography is how to protect the private key. We outline a method of protecting private keys using cryptographic camouflage. Specifically, we do ...
Douglas N. Hoover, B. N. Kausik
ATAL
2008
Springer
13 years 8 months ago
Internal models and private multi-agent belief revision
We generalize AGM belief revision theory to the multi-agent case. To do so, we first generalize the semantics of the singleagent case, based on the notion of interpretation, to th...
Guillaume Aucher
TES
2005
Springer
13 years 12 months ago
Ad-UDDI: An Active and Distributed Service Registry
In SOA (Service Oriented Architecture), web service providers use service registries to publish services and requestors use registries to find them. The major current service regis...
Zongxia Du, Jinpeng Huai, Yunhao Liu