Sciweavers

3229 search results - page 156 / 646
» Theories with the Independence Property
Sort
View
CSFW
2009
IEEE
15 years 7 months ago
A Method for Proving Observational Equivalence
—Formal methods have proved their usefulness for analyzing the security of protocols. Most existing results focus on trace properties like secrecy (expressed as a reachability pr...
Véronique Cortier, Stéphanie Delaune
98
Voted
CORR
2010
Springer
102views Education» more  CORR 2010»
15 years 28 days ago
How to prevent type-flaw and multi-protocol attacks on security protocols under Exclusive-OR
Type-flaw attacks and multi-protocol attacks on security protocols have been frequently reported in the literature. Heather et al. and Guttman et al. proved that these could be pr...
Sreekanth Malladi
78
Voted
SIGECOM
2008
ACM
81views ECommerce» more  SIGECOM 2008»
15 years 22 days ago
Self-financed wagering mechanisms for forecasting
We examine a class of wagering mechanisms designed to elicit truthful predictions from a group of people without requiring any outside subsidy. We propose a number of desirable pr...
Nicolas S. Lambert, John Langford, Jennifer Wortma...
102
Voted
CORR
2007
Springer
116views Education» more  CORR 2007»
15 years 24 days ago
A presentation of Quantum Logic based on an "and then" connective
When a physicist performs a quantic measurement, new information about the system at hand is gathered. This presentation studies the logical properties of how this new information...
Daniel Lehmann
105
Voted
ICAIL
2009
ACM
15 years 5 months ago
The network of French legal codes
We propose an analysis of the codified Law of France as a structured system. Fifty two legal codes are selected on the basis of explicit legal criteria and considered as vertices ...
Pierre Mazzega, Danièle Bourcier, Romain Bo...