Sciweavers

315 search results - page 29 / 63
» Claims Analysis
Sort
View
137
Voted
CADE
2007
Springer
16 years 4 months ago
Automated Reasoning in Kleene Algebra
Abstract. It has often been claimed that model checking, special purpose automated deduction or interactive theorem proving are needed for formal program development. Recently, it ...
Georg Struth, Peter Höfner
190
Voted

Publication
545views
16 years 23 days ago
Reid et al.'s Distance Bounding Protocol and Mafia Fraud Attacks over Noisy Channels
Distance bounding protocols are an effective countermeasure against relay attacks including distance fraud, mafia fraud and terrorist fraud attacks. Reid et al. proposed the first ...
A. Mitrokotsa, C. Dimitrakakis, P. Peris-Lopez, J....
HICSS
2007
IEEE
149views Biometrics» more  HICSS 2007»
15 years 10 months ago
Managing a New Computer Device Development in a Creative ISO 9001 Certified Company: A Case Study
This paper describes the findings of a case study that explores the micro level factors surrounding the processes of creativity and process management in a creative organization. ...
Wolfgang Molnar, Joe Nandhakumar
CHES
2007
Springer
95views Cryptology» more  CHES 2007»
15 years 10 months ago
Side Channel Cryptanalysis of a Higher Order Masking Scheme
Abstract. In the recent years, DPA attacks have been widely investigated. In particular, 2-nd order DPA have been improved and successfully applied to break many masked implementat...
Jean-Sébastien Coron, Emmanuel Prouff, Matt...
139
Voted
PKDD
2007
Springer
146views Data Mining» more  PKDD 2007»
15 years 10 months ago
A Method for Multi-relational Classification Using Single and Multi-feature Aggregation Functions
This paper presents a novel method for multi-relational classification via an aggregation-based Inductive Logic Programming (ILP) approach. We extend the classical ILP representati...
Richard Frank, Flavia Moser, Martin Ester