Sciweavers

1914 search results - page 287 / 383
» Verification by Abstract Interpretation
Sort
View
88
Voted
CONCUR
2008
Springer
15 years 2 months ago
A Scalable and Oblivious Atomicity Assertion
Abstract. This paper presents SOAR: the first oblivious atomicity assertion with polynomial complexity. SOAR enables to check atomicity of a single-writer multi-reader register imp...
Rachid Guerraoui, Marko Vukolic
CRYPTO
2008
Springer
100views Cryptology» more  CRYPTO 2008»
15 years 2 months ago
Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms
Abstract. This paper discusses key recovery and universal forgery attacks on several MAC algorithms based on universal hash functions. The attacks use a substantial number of verif...
Helena Handschuh, Bart Preneel
134
Voted
CSL
2008
Springer
15 years 2 months ago
Fractional Collections with Cardinality Bounds, and Mixed Linear Arithmetic with Stars
Abstract. We present decision procedures for logical constraints involving collections such as sets, multisets, and fuzzy sets. Element membership in our collections is given by ch...
Ruzica Piskac, Viktor Kuncak
ESORICS
2008
Springer
15 years 2 months ago
User Privacy in Transport Systems Based on RFID E-Tickets
Abstract. Recently, operators of public transportation in many countries started to roll out electronic tickets (e-tickets). E-tickets offer several advantages to transit enterpris...
Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachs...
92
Voted
FASE
2008
Springer
15 years 2 months ago
What's in a Feature: A Requirements Engineering Perspective
Abstract. The notion of feature is heavily used in Software Engineering, especially for software product lines. However, this notion appears to be confusing, mixing various aspects...
Andreas Classen, Patrick Heymans, Pierre-Yves Scho...