Sciweavers

714 search results - page 63 / 143
» Certifying Model Checkers
Sort
View
IEEEARES
2008
IEEE
14 years 2 months ago
Matching Policies with Security Claims of Mobile Applications
The Security-by-Contract (S×C) framework has been recently proposed to address the trust relationship problem of the current security model adopted for mobile devices. The key id...
Nataliia Bielova, Marco Dalla Torre, Nicola Dragon...
EUROCRYPT
2007
Springer
14 years 1 months ago
The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks
Abstract. Multiparty signature protocols need protection against roguekey attacks, made possible whenever an adversary can choose its public key(s) arbitrarily. For many schemes, p...
Thomas Ristenpart, Scott Yilek
MM
1999
ACM
120views Multimedia» more  MM 1999»
14 years 1 days ago
An RTP-based synchronized hypermedia live lecture system for distance education
In this article, we have introduced a “Live Synchronized Hypermedia Live Lecture (SHLL) System” using RTP to synchronize the live presentation of streaming video lecture, HTML...
Herng-Yow Chen, Yen-Tsung Chia, Gin-Yi Chen, Jen-S...
DAC
2012
ACM
11 years 10 months ago
Equivalence checking for behaviorally synthesized pipelines
Loop pipelining is a critical transformation in behavioral synthesis. It is crucial to producing hardware designs with acceptable latency and throughput. However, it is a complex ...
Kecheng Hao, Sandip Ray, Fei Xie
SPIN
1999
Springer
13 years 12 months ago
Model Checking for Managers
Model checking is traditionally applied to computer system design. It has proven to be a valuable technique. However, it requires detailed specifications of systems and requirement...
Wil Janssen, Radu Mateescu, Sjouke Mauw, Peter Fen...