Sciweavers

1818 search results - page 145 / 364
» Granularity-Adaptive Proof Presentation
Sort
View
CRYPTO
1998
Springer
106views Cryptology» more  CRYPTO 1998»
14 years 2 months ago
New Efficient and Secure Protocols for Verifiable Signature Sharing and Other Applications
Verifiable Signature Sharing (VS ) enables the recipient of a digital signature, who is not necessarily the original signer, to share such signature among n proxies so that a subse...
Dario Catalano, Rosario Gennaro
SACRYPT
1998
Springer
14 years 2 months ago
Computational Alternatives to Random Number Generators
In this paper, we present a simple method for generating random-based signatures when random number generators are either unavailable or of suspected quality (malicious or accident...
David M'Raïhi, David Naccache, David Pointche...
ALT
1997
Springer
14 years 2 months ago
Synthesizing Noise-Tolerant Language Learners
An index for an r.e. class of languages (by definition) generates a sequence of grammars defining the class. An index for an indexed family of languages (by definition) generat...
John Case, Sanjay Jain, Arun Sharma
TAPSOFT
1997
Springer
14 years 2 months ago
Traces of I/O-Automata in Isabelle/HOLCF
Abstract. This paper presents a formalization of nite and in nite sequences in domain theory carried out in the theorem prover Isabelle. The results are used to model the metatheor...
Olaf Müller, Tobias Nipkow
AADEBUG
1993
Springer
14 years 2 months ago
Slicing Programs with Arbitrary Control-flow
Program slicing is a program transformation that is useful in program debugging, program maintenance, and other applications that involve understanding program behavior. Given a p...
Thomas Ball, Susan Horwitz