Sciweavers

719 search results - page 114 / 144
» Proving Security Protocols Correct
Sort
View
FFA
2006
79views more  FFA 2006»
14 years 9 months ago
Lattice-based threshold-changeability for standard CRT secret-sharing schemes
We consider the problem of increasing the threshold parameter of a secret-sharing scheme after the setup (share distribution) phase, without further communication between the deal...
Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang
AGENTS
2001
Springer
15 years 2 months ago
Representing social structures in UML
From a software engineering perspective, agent systems are a specialization of object-oriented (OO) systems, in which individual objects have their own threads of control and thei...
H. Van Dyke Parunak, James Odell
FOSSACS
2009
Springer
15 years 4 months ago
On the Foundations of Quantitative Information Flow
There is growing interest in quantitative theories of information flow in a variety of contexts, such as secure information flow, anonymity protocols, and side-channel analysis. ...
Geoffrey Smith
ICPPW
2002
IEEE
15 years 2 months ago
Localized Group Membership Service for Ad Hoc Networks
We present a specification for a new, localized group membership service that maintains the membership status of adjacent nodes – called neighbors – in a mobile distributed s...
Linda Briesemeister, Günter Hommel
FMCO
2004
Springer
123views Formal Methods» more  FMCO 2004»
15 years 1 months ago
rCOS: Refinement of Component and Object Systems
Abstract. We present a model of object-oriented and component-based refinement. For object-orientation, the model is class-based and refinement is about correct changes in the stru...
Zhiming Liu, Jifeng He, Xiaoshan Li