Sciweavers

963 search results - page 118 / 193
» Conditional Digital Signatures
Sort
View
CSL
2006
Springer
15 years 6 months ago
Relating Two Standard Notions of Secrecy
Abstract. Two styles of definitions are usually considered to express that a security protocol preserves the confidentiality of a data s. Reachability-based secrecy means that s sh...
Véronique Cortier, Michaël Rusinowitch...
149
Voted
BIRTHDAY
2008
Springer
15 years 4 months ago
A Heterogeneous Approach to UML Semantics
Abstract. UML models consist of several diagrams of different types describing different views of a software system ranging from specifications of the static system structure to de...
María Victoria Cengarle, Alexander Knapp, A...
142
Voted
LICS
2010
IEEE
15 years 21 days ago
Alternating Timed Automata over Bounded Time
Alternating timed automata are a powerful extension of classical Alur-Dill timed automata that are closed under all Boolean operations. They have played a key role, among others, ...
Mark Jenkins, Joël Ouaknine, Alexander Rabino...
SEKE
2010
Springer
15 years 20 days ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li
86
Voted
ICC
2009
IEEE
151views Communications» more  ICC 2009»
15 years 1 days ago
Mapping Techniques for UWB Positioning
This paper deals with a wireless indoor positioning problem in which the location of a tag is estimated from range measurements taken by fixed beacons. The measurements may be affe...
E. Arias-de-Reyna, Umberto Mengali