Sciweavers

157 search results - page 13 / 32
» A Universally Composable Mix-Net
Sort
View
ENTCS
2010
88views more  ENTCS 2010»
13 years 4 months ago
Range and Set Abstraction using SAT
d Set Abstraction using SAT Edd Barrett Andy King School of Computing, University of Kent, CT2 7NF, UK Symbolic decision trees are not the only way to correlate the relationship b...
Edd Barrett, Andy King
ECEASST
2010
13 years 2 months ago
Security Evaluation and Hardening of Free and Open Source Software (FOSS)
Abstract: Recently, Free and Open Source Software (FOSS) has emerged as an alternative to Commercial-Off-The-Shelf (COTS) software. Now, FOSS is perceived as a viable long-term sol...
Robert Charpentier, Mourad Debbabi, Dima Alhadidi,...
CORR
2011
Springer
202views Education» more  CORR 2011»
12 years 11 months ago
First-order Logic: Modality and Intensionality
Contemporary use of the term ’intension’ derives from the traditional logical Frege-Russell’s doctrine that an idea (logic formula) has both an extension and an intension. Al...
Zoran Majkic
PERCOM
2006
ACM
14 years 7 months ago
Specification of a Functional Architecture for E-Learning Supported by Wireless Technologies
This paper proposes a distributed platform designed to support pervasive learning and interactivity on a university campus and to ease tasks related to learning and teaching. The ...
Philip Grew, Francesco Giudici, Elena Pagani
CTRSA
2011
Springer
189views Cryptology» more  CTRSA 2011»
12 years 11 months ago
Ideal Key Derivation and Encryption in Simulation-Based Security
Abstract. Many real-world protocols, such as SSL/TLS, SSH, IPsec, IEEE 802.11i, DNSSEC, and Kerberos, derive new keys from other keys. To be able to analyze such protocols in a com...
Ralf Küsters, Max Tuengerthal