Sciweavers

4445 search results - page 732 / 889
» Reflective Authorization Systems
Sort
View
149
Voted
EUROCRYPT
1998
Springer
15 years 9 months ago
Strengthened Security for Blind Signatures
Abstract. Provable security is a very nice property for cryptographic protocols. Unfortunately, in many cases, this is at the cost of a considerable loss in terms of efficiency. Mo...
David Pointcheval
UML
1998
Springer
15 years 9 months ago
The UML as a Formal Modeling Notation
The Uni ed Modeling Language UML is rapidly emerging as a de-facto standard for modelling OO systems. Given this role, it is imperative that the UML needs a well-de ned, fully expl...
Andy Evans, Robert B. France, Kevin Lano, Bernhard...
APSEC
1996
IEEE
15 years 9 months ago
A Prototype of a Concurrent Behavior Monitoring Tool for Testing of Concurrent Programs
Testing of concurrent programs is much more difficult than that of sequential programs. A concurrent program behaves nondeterministically, that is, the program may produce differe...
Eisuke Itoh, Zengo Furukawa, Kazuo Ushijima
136
Voted
COCO
1994
Springer
100views Algorithms» more  COCO 1994»
15 years 9 months ago
Relative to a Random Oracle, NP is Not Small
Resource-bounded measure as originated by Lutz is an extension of classical measure theory which provides a probabilistic means of describing the relative sizes of complexity clas...
Steven M. Kautz, Peter Bro Miltersen
160
Voted
ESORICS
1994
Springer
15 years 9 months ago
A Calculus for Secure Channel Establishment in Open Networks
This paper presents a calculus of channel security properties which allows to analyze and compare protocols for establishing secure in an insecure open network at a high level of a...
Ueli M. Maurer, Pierre E. Schmid