Sciweavers

3573 search results - page 637 / 715
» Reasoning about Codata
Sort
View
CRYPTO
2004
Springer
112views Cryptology» more  CRYPTO 2004»
15 years 6 months ago
Feistel Schemes and Bi-linear Cryptanalysis
Abstract. In this paper we introduce the method of bi-linear cryptanalysis (BLC), designed specifically to attack Feistel ciphers. It allows to construct periodic biased character...
Nicolas Courtois
EMSOFT
2004
Springer
15 years 6 months ago
A metrics system for quantifying operational coupling in embedded computer control systems
One central issue in system structuring and quality prediction is the interdependencies of system modules. This paper proposes a novel technique for determining the operational co...
De-Jiu Chen, Martin Törngren
ESOP
2004
Springer
15 years 6 months ago
Trust Management in Strand Spaces: A Rely-Guarantee Method
We show how to combine trust management theories with nonce-based cryptographic protocols. The strand space framework for protocol analysis is extended by associating formulas from...
Joshua D. Guttman, F. Javier Thayer, Jay A. Carlso...
125
Voted
IFIP
2004
Springer
15 years 6 months ago
Behavioural Equivalences for Dynamic Web Data
Peer-to-peer systems, exchanging dynamic documents through Web services, are a simple and effective platform for data integration on the internet. Dynamic documents can contain b...
Sergio Maffeis, Philippa Gardner
93
Voted
OOPSLA
2004
Springer
15 years 6 months ago
Practical predicate dispatch
Predicate dispatch is an object-oriented (OO) language mechanism for determining the method implementation to be invoked upon a message send. With predicate dispatch, each method ...
Todd D. Millstein