Sciweavers

5255 search results - page 65 / 1051
» Formal Methods for Privacy
Sort
View
FM
2006
Springer
153views Formal Methods» more  FM 2006»
14 years 1 months ago
Formal Methods and Cryptography
Security-critical systems are an important application area for formal methods. However, such systems often contain cryptographic subsystems. The natural definitions of these subsy...
Michael Backes, Birgit Pfitzmann, Michael Waidner
ZUM
2000
Springer
14 years 1 months ago
Formal Methods for Industrial Products
We have recently completed the specication and security proof of a large, industrial scale application. The application is security critical, and the modelling and proof were done ...
Susan Stepney, David Cooper
IWFM
1998
125views Formal Methods» more  IWFM 1998»
13 years 11 months ago
Mathematics for Formal Methods, a Proposal for Education Reform
It is widely recognized that there is a body of mathematics which is crucial to the underpinning of computer science, software engineering, and information and communications tech...
Mícheál Mac an Airchinnigh
CAISE
1997
Springer
14 years 2 months ago
OO-METHOD: An OO Software Production Environment Combining Conventional and Formal Methods
OO-Method is an OO Methodology that blends the use of formal specification systems with conventional OO methodologies based on practice. In contrast to other approaches in this fi...
Oscar Pastor, Emilio Insfrán, Vicente Pelec...
JSS
2006
88views more  JSS 2006»
13 years 10 months ago
A formal representation of functional size measurement methods
Estimating software size is a difficult task that requires a methodological approach. Many different methods that exist today use distinct abstractions to depict a software system...
Marjan Hericko, Ivan Rozman, Ales Zivkovic