Sciweavers

1518 search results - page 4 / 304
» Cryptographic Test Correction
Sort
View
CSFW
2002
IEEE
14 years 11 days ago
Security Protocol Design via Authentication Tests
We describe a protocol design process, and illustrate its use by creating ATSPECT, an Authentication Test-based Secure Protocol for Electronic Commerce Transactions. The design pr...
Joshua D. Guttman
ASM
2004
ASM
14 years 24 days ago
The Cryptographic Abstract Machine
tographic Abstract Machine Dean Rosenzweig and Davor Runje University of Zagreb The Cryptographic Abstract Machine is an executional model of cryptographic actions, independent of ...
Dean Rosenzweig, Davor Runje
TCC
2005
Springer
94views Cryptology» more  TCC 2005»
14 years 26 days ago
Optimal Error Correction Against Computationally Bounded Noise
For computationally bounded adversarial models of error, we construct appealingly simple, efficient, cryptographic encoding and unique decoding schemes whose error-correction capab...
Silvio Micali, Chris Peikert, Madhu Sudan, David A...
TIT
2010
107views Education» more  TIT 2010»
13 years 2 months ago
Optimal Error Correction for Computationally Bounded Noise
For adversarial but computationally bounded models of error, we construct appealingly simple and efficient cryptographic encoding and unique decoding schemes whose error-correctio...
Silvio Micali, Chris Peikert, Madhu Sudan, David A...
FM
2005
Springer
108views Formal Methods» more  FM 2005»
14 years 25 days ago
Formal Methods and Testing: Hypotheses, and Correctness Approximations
It has been recognised for a while that formal specifications can bring much to software testing. Numerous methods have been proposed for the derivation of test cases from various ...
Marie-Claude Gaudel