Sciweavers

3228 search results - page 258 / 646
» Computationally Sound Proofs
Sort
View
CSFW
2011
IEEE
14 years 4 months ago
Security for Key Management Interfaces
—We propose a much-needed formal definition of security for cryptographic key management APIs. The advantages of our definition are that it is general, intuitive, and applicabl...
Steve Kremer, Graham Steel, Bogdan Warinschi
ECOOP
2010
Springer
15 years 9 months ago
The Essence of JavaScript
We reduce JavaScript to a core calculus structured as a small-step operational semantics. We present several peculiarities of the language and show that our calculus models them. W...
Arjun Guha, Claudiu Saftoiu, Shriram Krishnamurthi
IROS
2009
IEEE
142views Robotics» more  IROS 2009»
15 years 11 months ago
Phoneme acquisition model based on vowel imitation using Recurrent Neural Network
- A phoneme-acquisition system was developed using a computational model that explains the developmental process of human infants in the early period of acquiring language. There a...
Hisashi Kanda, Tetsuya Ogata, Toru Takahashi, Kazu...
LICS
2007
IEEE
15 years 11 months ago
Principles of Superdeduction
In predicate logic, the proof that a theorem P holds in a theory Th is typically conducted in natural deduction or in the sequent calculus using all the information contained in t...
Paul Brauner, Clément Houtmann, Claude Kirc...
CRYPTO
2005
Springer
72views Cryptology» more  CRYPTO 2005»
15 years 10 months ago
Unconditional Characterizations of Non-interactive Zero-Knowledge
Abstract. Non-interactive zero-knowledge (NIZK) proofs have been investigated in two models: the Public Parameter model and the Secret Parameter model. In the former, a public stri...
Rafael Pass, Abhi Shelat