Sciweavers

108 search results - page 10 / 22
» Verifying Design with Proof Scores
Sort
View
103
Voted
EUROCRYPT
2000
Springer
15 years 4 months ago
Fair Encryption of RSA Keys
Cryptography is more and more concerned with elaborate protocols involving many participants. In some cases, it is crucial to be sure that players behave fairly especially when the...
Guillaume Poupard, Jacques Stern
CORR
2007
Springer
122views Education» more  CORR 2007»
15 years 5 days ago
Impact of Thermal Behavior on Offset in a High-Q Gyroscope
In this paper, the CFD approach is used to simulate the thermal behavior in a sensitive high-Q gyroscope. The electromagnetically driving wires, in which the alternating current f...
Fei Duan, Jiwei Jiao, Yucai Wang
116
Voted
STTT
2010
122views more  STTT 2010»
14 years 10 months ago
Rodin: an open toolset for modelling and reasoning in Event-B
Event-B is a formal method for system-level modelling and analysis. Key features of Event-B are the use of set theory as a modelling notation, the use of ent to represent systems a...
Jean-Raymond Abrial, Michael J. Butler, Stefan Hal...
99
Voted
CHI
2007
ACM
16 years 23 days ago
Approaches to web search and navigation for older computer novices
: A proof of concept web search and navigation system was developed for older people for whom the Internet is seen as an alien territory. A joint industry/academia team deployed Us...
Anna Dickinson, Michael J. Smith, John L. Arnott, ...
CSFW
2006
IEEE
15 years 6 months ago
Cryptographically Sound Theorem Proving
We describe a faithful embedding of the Dolev-Yao model of Backes, Pfitzmann, and Waidner (CCS 2003) in the theorem prover Isabelle/HOL. This model is cryptographically sound in ...
Christoph Sprenger, Michael Backes, David A. Basin...