Sciweavers

60 search results - page 5 / 12
» Sound scope headphones
Sort
View
126
Voted
FSTTCS
2003
Springer
15 years 7 months ago
A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol
We prove the Needham-Schroeder-Lowe public-key protocol secure under real, active cryptographic attacks including concurrent protocol runs. This proof is based on an abstract crypt...
Michael Backes, Birgit Pfitzmann
122
Voted
ESORICS
2004
Springer
15 years 7 months ago
A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol
We present the first cryptographically sound security proof of the well-known Otway-Rees protocol. More precisely, we show that the protocol is secure against arbitrary active att...
Michael Backes
126
Voted
CSFW
2005
IEEE
15 years 7 months ago
A Cryptographically Sound Dolev-Yao Style Security Proof of an Electronic Payment System
We present the first cryptographically sound Dolev-Yaostyle security proof of a comprehensive electronic payment system. The payment system is a slightly simplified variant of t...
Michael Backes, Markus Dürmuth
122
Voted
FSTTCS
2008
Springer
15 years 2 months ago
Sound Lemma Generation for Proving Inductive Validity of Equations
ABSTRACT. In many automated methods for proving inductive theorems, finding a suitable generalization of a conjecture is a key for the success of proof attempts. On the other hand...
Takahito Aoto
96
Voted
NIME
2005
Springer
215views Music» more  NIME 2005»
15 years 7 months ago
GoingPublik: Using Realtime Global Score Synthesis
This paper takes the reader through various elements of the GoingPublik sound artwork for distributive ensemble and introduces the Realtime Score Synthesis tool (RSS) used as a co...
Arthur Clay, Thomas M. Frey, Jürg Gutknecht