Sciweavers

1064 search results - page 94 / 213
» Cryptography from Anonymity
Sort
View
CSFW
2002
IEEE
15 years 8 months ago
Types and Effects for Asymmetric Cryptographic Protocols
We present the first type and effect system for proving authenticity properties of security protocols based on asymmetric cryptography. The most significant new features of our ...
Andrew D. Gordon, Alan Jeffrey
114
Voted
CIBCB
2006
IEEE
15 years 10 months ago
E2D: A Novel Tool for Annotating Protein Domains in Expressed Sequence Tags
The vast number of expressed sequence tags (ESTs) in public databases provides an important resource for comparative and functional genomics. A variety of methods based on homology...
Guo-Hsing Lee, Nai-Yu Chuang, Wen-Dar Lin, Chung-D...
QEST
2010
IEEE
15 years 1 months ago
Information Hiding in Probabilistic Concurrent Systems
Information hiding is a general concept which refers to the goal of preventing an adversary to infer secret information from the observables. Anonymity and Information Flow are exa...
Miguel E. Andrés, Catuscia Palamidessi, Pet...
WOSP
2000
ACM
15 years 8 months ago
Evaluating the performance engineering process
This contribution presents a model for process improvement in the area of performance engineering, which is called performance engineering maturity model. The use of this model al...
Andreas Schmietendorf, André Scholz, Claus ...
HOPL
2007
15 years 7 months ago
The evolution of Lua
We report on the birth and evolution of Lua and discuss how it moved from a simple configuration language to a versatile, widely used language that supports extensible semantics, ...
Roberto Ierusalimschy, Luiz Henrique de Figueiredo...