Sciweavers

2643 search results - page 27 / 529
» Higher order messaging
Sort
View
ITP
2010
165views Mathematics» more  ITP 2010»
14 years 2 months ago
A Mechanized Translation from Higher-Order Logic to Set Theory
Abstract. In order to make existing formalizations available for settheoretic developments, we present an automated translation of theories from Isabelle/HOL to Isabelle/ZF. This c...
Alexander Krauss, Andreas Schropp
CORR
2010
Springer
55views Education» more  CORR 2010»
13 years 9 months ago
Infinite Families of Optimal Splitting Authentication Codes Secure Against Spoofing Attacks of Higher Order
We consider the problem of constructing optimal authentication codes with splitting. New infinite families of such codes are obtained. In particular, we establish the first known...
Yeow Meng Chee, Xiande Zhang, Hui Zhang
POPL
2010
ACM
14 years 8 months ago
A Relational Modal Logic for Higher-Order Stateful ADTs
The method of logical relations is a classic technique for proving the equivalence of higher-order programs that implement the same observable behavior but employ different intern...
Derek Dreyer, Georg Neis, Andreas Rossberg, Lars B...
INFOCOM
2006
IEEE
14 years 5 months ago
Relay Placement for Higher Order Connectivity in Wireless Sensor Networks
Abstract— Sensors typically use wireless transmitters to communicate with each other. However, sensors may be located in a way that they cannot even form a connected network (e.g...
Abhishek Kashyap, Samir Khuller, Mark A. Shayman
CHES
2010
Springer
159views Cryptology» more  CHES 2010»
14 years 1 days ago
Provably Secure Higher-Order Masking of AES
Implementations of cryptographic algorithms are vulnerable to Side Channel Analysis (SCA). To counteract it, masking schemes are usually involved which randomize key-dependent data...
Matthieu Rivain, Emmanuel Prouff