Sciweavers

2392 search results - page 285 / 479
» informs 2000
Sort
View
140
Voted
EWSPT
2000
Springer
15 years 8 months ago
Software Process Technologies and the Competitiveness Challenge
Competitive quality is a need for the progress of the Information Technology sector. For enterprises, process is the starting point of all the approaches in the achievement of comp...
Giovanni A. Cignoni
FC
2000
Springer
83views Cryptology» more  FC 2000»
15 years 8 months ago
Secret Key Authentication with Software-Only Verification
Abstract Two protocols for authentication based on symmetric key cryptography are described, where the verifier can be implemented in software completely, without the need for secu...
Jaap-Henk Hoepman
FC
2000
Springer
119views Cryptology» more  FC 2000»
15 years 8 months ago
Sharing Decryption in the Context of Voting or Lotteries
Abstract. Several public key cryptosystems with additional homomorphic properties have been proposed so far. They allow to perform computation with encrypted data without the knowl...
Pierre-Alain Fouque, Guillaume Poupard, Jacques St...
FMCAD
2000
Springer
15 years 8 months ago
Model Checking Synchronous Timing Diagrams
Abstract. Model checking is an automated approach to the formal verification of hardware and software. To allow model checking tools to be used by the hardware or software designer...
Nina Amla, E. Allen Emerson, Robert P. Kurshan, Ke...
164
Voted
FROCOS
2000
Springer
15 years 8 months ago
Non-Trivial Symbolic Computations in Proof Planning
Abstract. We discuss a pragmatic approach to integrate computer algebra into proof planning. It is based on the idea to separate computation and veri cation and can thereby exploit...
Volker Sorge