Sciweavers

1034 search results - page 122 / 207
» User Models and User Physical Capability
Sort
View
POPL
2000
ACM
15 years 7 months ago
Verifying Secrets and Relative Secrecy
Systems that authenticate a user based on a shared secret (such as a password or PIN) normally allow anyone to query whether the secret is a given value. For example, an ATM machi...
Dennis M. Volpano, Geoffrey Smith
ICVGIP
2004
15 years 5 months ago
Design of A Geometry Streaming System
The size and detail of graphics environments in everyday use has gone up considerably recently. Still, most applications use locally resident geometric content for rendering. In t...
Soumyajit Deb, P. J. Narayanan
WSC
1997
15 years 5 months ago
Simulation Using GPSS/H
GPSS/H is a tried-and-true simulation tool whose user base, both commercial and academic, continues to grow despite the presence of many “new” simulation technology trends. Th...
Robert C. Crain
EUROCRYPT
2011
Springer
14 years 7 months ago
Unbounded HIBE and Attribute-Based Encryption
In this work, we present HIBE and ABE schemes which are “unbounded” in the sense that the public parameters do not impose additional limitations on the functionality of the sy...
Allison B. Lewko, Brent Waters
SPIN
2004
Springer
15 years 9 months ago
Model-Driven Software Verification
Abstract. In the classic approach to logic model checking, software verification requires a manually constructed artifact (the model) to be written in the language that is accepted...
Gerard J. Holzmann, Rajeev Joshi