Sciweavers

2043 search results - page 138 / 409
» Reasoning About Security Models
Sort
View
AFRICACRYPT
2009
Springer
15 years 4 months ago
Certified Encryption Revisited
The notion of certified encryption had recently been suggested as a suitable setting for analyzing the security of encryption against adversaries that tamper with the key-registrat...
Pooya Farshim, Bogdan Warinschi
CCS
2005
ACM
15 years 6 months ago
PeerAccess: a logic for distributed authorization
This paper introduces the PeerAccess framework for reasoning about authorization in open distributed systems, and shows how a parameterization of the framework can be used to reas...
Marianne Winslett, Charles C. Zhang, Piero A. Bona...
KR
2004
Springer
15 years 6 months ago
Qualitative Probabilistic Matching with Hierarchical Descriptions
This paper is about decision making based on real-world descriptions of a domain. There are many domains where differentpeoplehavedescribedvariouspartsoftheworldatdifferent f abst...
Clinton Smyth, David Poole
LPAR
2007
Springer
15 years 7 months ago
Deciding Knowledge in Security Protocols for Monoidal Equational Theories
Abstract. In formal approaches, messages sent over a network are usually modeled by terms together with an equational theory, axiomatizing the properties of the cryptographic funct...
Véronique Cortier, Stéphanie Delaune
57
Voted
ACL
2010
14 years 10 months ago
Combining Data and Mathematical Models of Language Change
English noun/verb (N/V) pairs (contract, cement) have undergone complex patterns of change between 3 stress patterns for several centuries. We describe a longitudinal dataset of N...
Morgan Sonderegger, Partha Niyogi