Sciweavers

7109 search results - page 79 / 1422
» Process Algebra with Combinators
Sort
View
CISC
2009
Springer
185views Cryptology» more  CISC 2009»
14 years 8 months ago
Algebraic Cryptanalysis of Curry and Flurry Using Correlated Messages
In [10], Buchmann, Pyshkin and Weinmann have described two families of Feistel and SPN block ciphers called Flurry and Curry respectively. These two families of ciphers are fully p...
Jean-Charles Faugère, Ludovic Perret
ACSW
2006
14 years 11 months ago
A method for access authorisation through delegation networks
Owners of systems and resources usually want to control who can access them. This must be based on having a process for authorising certain parties, combined with mechanisms for e...
Audun Jøsang, Dieter Gollmann, Richard Au
83
Voted
JLP
2007
89views more  JLP 2007»
14 years 10 months ago
Preferential choice and coordination conditions
We present a process algebra with conditional expressions of which the conditions concern the enabledness of actions in the context in which a process is placed. With those conditi...
Jan A. Bergstra, C. A. Middelburg
ICCV
1995
IEEE
15 years 1 months ago
Matching Constraints and the Joint Image
This paper studies the geometry of multi-image perspective projection and the matching constraints that this induces on image measurements. The combined image projections define ...
Bill Triggs
82
Voted
IFM
2010
Springer
203views Formal Methods» more  IFM 2010»
14 years 8 months ago
A CSP Approach to Control in Event-B
Event-B has emerged as one of the dominant state-based formal techniques used for modelling control-intensive applications. Due to the blocking semantics of events, their ordering ...
Steve Schneider, Helen Treharne, Heike Wehrheim