Sciweavers

719 search results - page 114 / 144
» Proving Security Protocols Correct
Sort
View
FFA
2006
79views more  FFA 2006»
15 years 4 months ago
Lattice-based threshold-changeability for standard CRT secret-sharing schemes
We consider the problem of increasing the threshold parameter of a secret-sharing scheme after the setup (share distribution) phase, without further communication between the deal...
Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang
AGENTS
2001
Springer
15 years 8 months ago
Representing social structures in UML
From a software engineering perspective, agent systems are a specialization of object-oriented (OO) systems, in which individual objects have their own threads of control and thei...
H. Van Dyke Parunak, James Odell
FOSSACS
2009
Springer
15 years 11 months ago
On the Foundations of Quantitative Information Flow
There is growing interest in quantitative theories of information flow in a variety of contexts, such as secure information flow, anonymity protocols, and side-channel analysis. ...
Geoffrey Smith
ICPPW
2002
IEEE
15 years 9 months ago
Localized Group Membership Service for Ad Hoc Networks
We present a specification for a new, localized group membership service that maintains the membership status of adjacent nodes – called neighbors – in a mobile distributed s...
Linda Briesemeister, Günter Hommel
FMCO
2004
Springer
123views Formal Methods» more  FMCO 2004»
15 years 8 months ago
rCOS: Refinement of Component and Object Systems
Abstract. We present a model of object-oriented and component-based refinement. For object-orientation, the model is class-based and refinement is about correct changes in the stru...
Zhiming Liu, Jifeng He, Xiaoshan Li