Sciweavers

714 search results - page 50 / 143
» Certifying Model Checkers
Sort
View
INFORMATICALT
2010
170views more  INFORMATICALT 2010»
13 years 6 months ago
A Provably Secure Proxy Signature Scheme in Certificateless Cryptography
A proxy signature scheme enables an original signer to delegate its signing capability to a proxy signer and then the proxy signer can sign a message on behalf of the original sign...
Hu Xiong, Fagen Li, Zhiguang Qin
AINA
2005
IEEE
14 years 2 months ago
A Practical Modelling Notation for Secure Distributed Computation
Mobile code computation has lead to a new paradigm of distributed computation. A mobile process can move from site to site and interact with the resources as a local process. To p...
Yih-Jiun Lee, Peter Henderson
CCS
2006
ACM
14 years 13 days ago
Multi-signatures in the plain public-Key model and a general forking lemma
A multi-signature scheme enables a group of signers to produce a compact, joint signature on a common document, and has many potential uses. However, existing schemes impose key s...
Mihir Bellare, Gregory Neven
NLPRS
2001
Springer
14 years 1 months ago
Automatic Segmentation of Words using Syllable Bigram Statistics
We present a syllable bigram model for segmenting a Korean sentence into words and correcting word-spacing errors in the spelling checker. We evaluated the system’s performance ...
Seung-Shik Kang, Chong-Woo Woo
SPIN
2000
Springer
14 years 8 days ago
Verification and Optimization of a PLC Control Schedule
Abstract. We report on the use of model checking techniques for both the verification of a process control program and the derivation of optimal control schedules. Most of this wor...
Ed Brinksma, Angelika Mader