Sciweavers

8587 search results - page 1471 / 1718
» Interactive dynamic abstraction
Sort
View
138
Voted
ACNS
2009
Springer
168views Cryptology» more  ACNS 2009»
15 years 10 months ago
Session-state Reveal Is Stronger Than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange Protocol
Abstract. In the paper “Stronger Security of Authenticated Key Exchange” [1,2], a new security model for authenticated key exchange protocols (eCK) is proposed. The new model i...
Cas J. F. Cremers
CANS
2009
Springer
136views Cryptology» more  CANS 2009»
15 years 10 months ago
Verifying Anonymous Credential Systems in Applied Pi Calculus
Abstract. Anonymous credentials are widely used to certify properties of a credential owner or to support the owner to demand valuable services, while hiding the user’s identity ...
Xiangxi Li, Yu Zhang, Yuxin Deng
CBSE
2009
Springer
15 years 10 months ago
Selecting Fault Tolerant Styles for Third-Party Components with Model Checking Support
To build highly available or reliable applications out of unreliable third-party components, some software-implemented fault-tolerant mechanisms are introduced to gracefully deal w...
Junguo Li, Xiangping Chen, Gang Huang, Hong Mei, F...
CPAIOR
2009
Springer
15 years 10 months ago
Learning How to Propagate Using Random Probing
Abstract. In constraint programming there are often many choices regarding the propagation method to be used on the constraints of a problem. However, simple constraint solvers usu...
Efstathios Stamatatos, Kostas Stergiou
127
Voted
ECTEL
2009
Springer
15 years 10 months ago
Phantom Tasks and Invisible Rubric: The Challenges of Remixing Learning Objects in the Wild
Learning Objects are atomic packages of learning content with associated activities that can be reused in different contexts. However traditional Learning Objects can be complex an...
David E. Millard, Yvonne Margaret Howard, Patrick ...
« Prev « First page 1471 / 1718 Last » Next »