Sciweavers

1941 search results - page 247 / 389
» Reasoning about Computations Using Two-Levels of Logic
Sort
View
EUROPKI
2004
Springer
15 years 9 months ago
Distributed CA-based PKI for Mobile Ad Hoc Networks Using Elliptic Curve Cryptography
The implementation of a standard PKI in a mobile ad hoc network (MANET) is not practical for several reasons: (1) lack of a fixed infrastructure; (2) a centralized certification au...
Charikleia Zouridaki, Brian L. Mark, Kris Gaj, Ros...
145
Voted
SAC
2009
ACM
15 years 8 months ago
Leveraging OWL for GIS interoperability: rewards and pitfalls
Information systems often require combining datasets available in different formats, and geographical information systems are no exception. While semantic technologies have been u...
Serge Boucher, Esteban Zimányi
CADE
2011
Springer
14 years 3 months ago
Deciding Security for Protocols with Recursive Tests
Abstract. Security protocols aim at securing communications over public networks. Their design is notoriously difficult and error-prone. Formal methods have shown their usefulness ...
Mathilde Arnaud, Véronique Cortier, St&eacu...
APLAS
2009
ACM
15 years 10 months ago
Witnessing Purity, Constancy and Mutability
Restricting destructive update to values of a distinguished reference type prevents functions from being polymorphic in the mutability of their arguments. This restriction makes it...
Ben Lippmeier
AIMS
2008
Springer
15 years 10 months ago
Dynamic Consistency Analysis for Convergent Operators
It has been shown that sets of convergent operators with a shared fixed point can simulate autonomic control mechanisms, but many questions remain about this management technique....
Alva L. Couch, Marc Chiarini