Sciweavers

2894 search results - page 520 / 579
» Latent semantic analysis
Sort
View
LICS
1999
IEEE
14 years 1 months ago
Proving Security Protocols Correct
Security protocols use cryptography to set up private communication channels on an insecure network. Many protocols contain flaws, and because security goals are seldom specified ...
Lawrence C. Paulson
KBSE
1998
IEEE
14 years 1 months ago
Specification-based Browsing of Software Component Libraries
Specification-based retrieval provides exact contentoriented access to component libraries but requires too much deductive power. Specification-based browsing evades this bottlene...
B. Fischer
FASE
1998
Springer
14 years 29 days ago
Specifying and Analyzing Dynamic Software Architectures
A critical issue for complex component-based systems design is the modeling and analysis of architecture. One of the complicating factors in developing architectural models is acc...
Robert Allen, Rémi Douence, David Garlan
ICSE
1998
IEEE-ACM
14 years 29 days ago
Integrating Architecture Description Languages with a Standard Design Method
Software architecture descriptions are high-level models of software systems. Some researchers have proposed specialpurpose architectural notations that have a great deal of expre...
Jason E. Robbins, Nenad Medvidovic, David F. Redmi...
PKC
1998
Springer
107views Cryptology» more  PKC 1998»
14 years 29 days ago
On the Security of ElGamal Based Encryption
The ElGamal encryption scheme has been proposed several years ago and is one of the few probabilistic encryption schemes. However, its security has never been concretely proven bas...
Yiannis Tsiounis, Moti Yung