Sciweavers

6978 search results - page 187 / 1396
» Reframing Requirements Analysis
Sort
View
82
Voted
FROCOS
2005
Springer
15 years 3 months ago
Logical Analysis of Hash Functions
Abstract. In this paper we report on a novel approach for uniform encoding of hash functions (but also other cryptographic functions) into propositional logic formulae, and reducin...
Dejan Jovanovic, Predrag Janicic
97
Voted
SERA
2005
Springer
15 years 3 months ago
Bridging the Gap between Analysis and Design Using Dependency Diagrams
Requirements specifications often make use of a number of scenarios that are interrelated and that depend on each other in many ways. However, they are often treated separately, o...
Simona Vasilache, Jiro Tanaka
ECLIPSE
2004
ACM
15 years 3 months ago
Design mentoring based on design evolution analysis
Developing and consistently evolving quality software designs requires both theoretical knowledge and practical skills. The former can be communicated in a classroom; the latter h...
Zhenchang Xing, Eleni Stroulia
ISW
2004
Springer
15 years 3 months ago
Security Analysis of Two Signcryption Schemes
Signcryption is a new cryptographic primitive that performs signing and encryption simultaneously, at a cost significantly lower than that required by the traditional signature-th...
Guilin Wang, Robert H. Deng, Dong Jin Kwak, Sang-J...
SAS
2004
Springer
103views Formal Methods» more  SAS 2004»
15 years 3 months ago
Information Flow Analysis in Logical Form
Abstract. We specify an information flow analysis for a simple imperative language, using a Hoare-like logic. The logic facilitates static checking of a larger class of programs t...
Torben Amtoft, Anindya Banerjee