Abstract The computational proof model of Bellare and Rogaway for cryptographic protocol analysis is complemented by providing a formal specification of the actions of the adversa...
Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchco...
We present an end-to-end tool-chain for model-based design and analysis of component-based embedded realtime software, with Avionics Mission Computing as an application domain. Th...
Zonghua Gu, Shige Wang, Sharath Kodase, Kang G. Sh...
d abstract) Prateek Gupta and Vitaly Shmatikov The University of Texas at Austin We present a cryptographically sound formal method for proving correctness of key exchange protoco...
The distribution of geometric features is anisotropic by its nature. Intrinsic properties of surfaces such as normal curvatures, for example, varies with direction. In this paper ...
Abstract. The tracking of individual cells in time-lapse microscopy facilitates the assessment of certain characteristics of different cell types. Since manual tracking of an adequ...