Sciweavers

7393 search results - page 219 / 1479
» Synthesis-for-testability using transformations
Sort
View
147
Voted
LOPSTR
2001
Springer
15 years 8 months ago
Proof Theory, Transformations, and Logic Programming for Debugging Security Protocols
In this paper we define a sequent calculus to formally specify, simulate, debug and verify security protocols. In our sequents we distinguish between the current knowledge of prin...
Giorgio Delzanno, Sandro Etalle
134
Voted
POPL
2000
ACM
15 years 8 months ago
Transforming Out Timing Leaks
It has been shown that secret information can be leaked to external observers through covert timing channels. In this paper we are concerned with a kind of timing attack that want...
Johan Agat
119
Voted
DOLAP
1999
ACM
15 years 8 months ago
Aggregation Everywhere: Data Reduction and Transformation in the Phoenix Data Warehouse
This paper describes the Phoenix system, which loads a data warehouse and then reports against it. Between the raw atomic data of the source system and the business measures prese...
Steven Tolkin
150
Voted
ACISP
2010
Springer
15 years 5 months ago
Distinguishers for the Compression Function and Output Transformation of Hamsi-256
Hamsi is one of 14 remaining candidates in NIST's Hash Competition for the future hash standard SHA-3. Until now, little analysis has been published on its resistance to diffe...
Jean-Philippe Aumasson, Emilia Käsper, Lars R...
96
Voted
WEBIST
2008
15 years 5 months ago
Transforming a Competency Model to Parameterised Questions in Assessment
The problem of comparing and matching different learners' knowledge arises when assessment systems use a one-dimensional numerical value to represent "knowledge level&quo...
Onjira Sitthisak, Lester Gilbert, Hugh C. Davis