Sciweavers

1893 search results - page 328 / 379
» Computational composites
Sort
View
EUROCRYPT
1999
Springer
14 years 9 days ago
Proving in Zero-Knowledge that a Number Is the Product of Two Safe Primes
Abstract. We present the first efficient statistical zero-knowledge protocols to prove statements such as: – A committed number is a prime. – A committed (or revealed) number ...
Jan Camenisch, Markus Michels
SIGSOFT
1998
ACM
14 years 8 days ago
Reasoning about Implicit Invocation
Implicit invocation SN92, GN91] has become an important architectural style for large-scale system design and evolution. This paper addresses the lack of speci cation and veri cat...
David Garlan, Somesh Jha, David Notkin
FTRTFT
1998
Springer
14 years 8 days ago
A Modular Visual Model for Hybrid Systems
Visual description techniques are particularly important for the design of hybrid systems because specifications of such systems must usually be discussed between engineers from a ...
Radu Grosu, Thomas Stauner, Manfred Broy
ICMCS
1994
IEEE
123views Multimedia» more  ICMCS 1994»
14 years 5 days ago
Casual Collaboration
As computers are increasingly used to mediate social interaction, tools are needed not only to support direct communication, but also to create a richer social environment for the...
Judith S. Donath
SP
1990
IEEE
14 years 2 days ago
Probabilistic Interference
In recent times information flow and non-interference have become very popular concepts for expressing both integrity and privacy properties. We present the first general definitio...
James W. Gray III