Sciweavers

963 search results - page 118 / 193
» Conditional Digital Signatures
Sort
View
CSL
2006
Springer
14 years 1 months ago
Relating Two Standard Notions of Secrecy
Abstract. Two styles of definitions are usually considered to express that a security protocol preserves the confidentiality of a data s. Reachability-based secrecy means that s sh...
Véronique Cortier, Michaël Rusinowitch...
BIRTHDAY
2008
Springer
14 years 13 hour ago
A Heterogeneous Approach to UML Semantics
Abstract. UML models consist of several diagrams of different types describing different views of a software system ranging from specifications of the static system structure to de...
María Victoria Cengarle, Alexander Knapp, A...
LICS
2010
IEEE
13 years 8 months ago
Alternating Timed Automata over Bounded Time
Alternating timed automata are a powerful extension of classical Alur-Dill timed automata that are closed under all Boolean operations. They have played a key role, among others, ...
Mark Jenkins, Joël Ouaknine, Alexander Rabino...
SEKE
2010
Springer
13 years 8 months ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li
ICC
2009
IEEE
151views Communications» more  ICC 2009»
13 years 7 months ago
Mapping Techniques for UWB Positioning
This paper deals with a wireless indoor positioning problem in which the location of a tag is estimated from range measurements taken by fixed beacons. The measurements may be affe...
E. Arias-de-Reyna, Umberto Mengali