Sciweavers

346 search results - page 38 / 70
» Can we trust docking results
Sort
View
ECIS
2000
13 years 9 months ago
IT-Enabled Sophistication Banking
- Globalization of financial markets resulting from both IT (particularly internet standards) and increasing homogeneity of regulation has strongly affected the environment, financ...
Hans Ulrich Buhl, Dennis Kundisch, Andreas Leinfel...
ENTCS
2008
91views more  ENTCS 2008»
13 years 7 months ago
Implementing Real Numbers With RZ
RZ is a tool which translates axiomatizations of mathematical structures to program specifications using the realizability interpretation of logic. This helps programmers correctl...
Andrej Bauer, Iztok Kavkler
CORR
2006
Springer
169views Education» more  CORR 2006»
13 years 7 months ago
Concurrently Non-Malleable Zero Knowledge in the Authenticated Public-Key Model
We consider a type of zero-knowledge protocols that are of interest for their practical applications within networks like the Internet: efficient zero-knowledge arguments of knowl...
Yi Deng, Giovanni Di Crescenzo, Dongdai Lin
FSTTCS
2009
Springer
14 years 2 months ago
Simulation based security in the applied pi calculus
We present a symbolic framework for refinement and composition of security protocols. ework uses the notion of ideal functionalities. These are abstract systems which are secure b...
Stéphanie Delaune, Steve Kremer, Olivier Pe...
FLAIRS
2009
13 years 5 months ago
Modeling Belief Change on Epistemic States
Belief revision always results in trusting new evidence, so it may admit an unreliable one and discard a more confident one. We therefore use belief change instead of belief revis...
Jianbing Ma, Weiru Liu