Sciweavers

598 search results - page 56 / 120
» Generic Trace Theory
Sort
View
CCS
2005
ACM
14 years 3 months ago
Deciding security of protocols against off-line guessing attacks
We provide an effective procedure for deciding the existence of off-line guessing attacks on security protocols, for a bounded number of sessions. The procedure consists of a co...
Mathieu Baudet
CCS
2004
ACM
14 years 3 months ago
Reusable cryptographic fuzzy extractors
We show that a number of recent definitions and constructions of fuzzy extractors are not adequate for multiple uses of the same fuzzy secret—a major shortcoming in the case of...
Xavier Boyen
MPC
1998
Springer
83views Mathematics» more  MPC 1998»
14 years 2 months ago
Nested Datatypes
A nested datatype, also known as a non-regular datatype, is a parametrised datatype whose declaration involves different instances of the accompanying type parameters. Nested datat...
Richard S. Bird, Lambert G. L. T. Meertens
EWCBR
1993
Springer
14 years 2 months ago
Explanation-Driven Case-Based Reasoning
Problem solving in weak theory domains should compensate for the lack of strong theories by combining the various other knowledge types involved. Such methods should be able to eff...
Agnar Aamodt
CORR
1999
Springer
95views Education» more  CORR 1999»
13 years 9 months ago
Fixed-parameter tractability, definability, and model checking
In this article, we study parameterized complexity theory from the perspective of logic, or more specifically, descriptive complexity theory. We propose to consider parameterized ...
Jörg Flum, Martin Grohe