Sciweavers

4693 search results - page 77 / 939
» Verifying Hybrid Systems
Sort
View
SIAMSC
2008
125views more  SIAMSC 2008»
15 years 16 days ago
Hybrid Simulations of Reaction-Diffusion Systems in Porous Media
Abstract. Hybrid or multiphysics algorithms provide an efficient computational tool for combining micro- and macroscale descriptions of physical phenomena. Their use becomes impera...
Alexandre M. Tartakovsky, Daniel M. Tartakovsky, T...
78
Voted
GI
2009
Springer
15 years 4 months ago
Classifying Privacy and Verifiability Requirements for Electronic Voting
Abstract: Voter privacy and verifiability are fundamental security concepts for electronic voting. Existing literature on electronic voting provides many definitions and interpreta...
Lucie Langer, Axel Schmidt, Melanie Volkamer, Joha...
CANS
2009
Springer
276views Cryptology» more  CANS 2009»
14 years 10 months ago
Group Signatures with Verifier-Local Revocation and Backward Unlinkability in the Standard Model
Group signatures allow users to anonymously sign messages in the name of a group. Membership revocation has always been a critical issue in such systems. In 2004, Boneh and Shacham...
Benoît Libert, Damien Vergnaud
94
Voted
CAISE
2009
Springer
15 years 7 months ago
Verifying Action Semantics Specifications in UML Behavioral Models
MDD and MDA approaches require capturing the behavior of UML models in sufficient detail so that the models can be automatically implemented/executed in the production environment....
Elena Planas, Jordi Cabot, Cristina Gómez
103
Voted
SEFM
2007
IEEE
15 years 6 months ago
Verifying Security Properties of Cryptoprotocols: A Novel Approach
We model security protocols as a game tree using concepts of game semantics. Using this model we ascribe semantics to protocols written in the standard simple arrow notation. Acco...
Mohamed Saleh, Mourad Debbabi