Sciweavers

261 search results - page 30 / 53
» Formal Proof from UML Models
Sort
View
INFORMATICALT
2006
105views more  INFORMATICALT 2006»
15 years 3 months ago
Adaptive Chosen Ciphertext Secure Threshold Key Escrow Scheme from Pairing
This paper proposes a threshold key escrow scheme from pairing. It tolerates the passive adversary to access any internal data of corrupted key escrow agents and the active adversa...
Yu Long, Kefei Chen, Shengli Liu
122
Voted
MICCAI
2007
Springer
16 years 4 months ago
Towards an Identification of Tumor Growth Parameters from Time Series of Images
In cancer treatment, understanding the aggressiveness of the tumor is essential in therapy planning and patient follow-up. In this article, we present a novel method for quantifyin...
Ender Konukoglu, Olivier Clatz, Pierre-Yves Bondia...
134
Voted
TYPES
2000
Springer
15 years 7 months ago
Constructive Reals in Coq: Axioms and Categoricity
We describe a construction of the real numbers carried out in the Coq proof assistant. The basis is a set of axioms for the constructive real numbers as used in the FTA (Fundamenta...
Herman Geuvers, Milad Niqui
131
Voted
UIC
2007
Springer
15 years 9 months ago
Towards a Model of Interaction for Mutual Aware Devices and Everyday Artifacts
Abstract. Devices like PDAs, mobile phones and Smartcards can communicate with each other and to exchange information and they should be made mutually aware of each other. For priv...
Sea Ling, Seng Wai Loke, Maria Indrawan
114
Voted
CCS
2009
ACM
15 years 10 months ago
HAIL: a high-availability and integrity layer for cloud storage
We introduce HAIL (High-Availability and Integrity Layer), a distributed cryptographic system that allows a set of servers to prove to a client that a stored file is intact and r...
Kevin D. Bowers, Ari Juels, Alina Oprea