Sciweavers

2478 search results - page 119 / 496
» Message from the Chair
Sort
View
FAC
2008
80views more  FAC 2008»
15 years 4 months ago
Verification of Mondex electronic purses with KIV: from transactions to a security protocol
The Mondex case study about the specification and refinement of an electronic purse as defined in the Oxford Technical Monograph PRG-126 has recently been proposed as a challenge f...
Dominik Haneberg, Gerhard Schellhorn, Holger Grand...
INFORMATICALT
2010
126views more  INFORMATICALT 2010»
15 years 2 months ago
Identity-Based Threshold Proxy Signature from Bilinear Pairings
Abstract. Delegation of rights is a common practice in the real world. We present two identitybased threshold proxy signature schemes, which allow an original signer to delegate he...
Jenshiuh Liu, Shaonung Huang
CORR
2011
Springer
175views Education» more  CORR 2011»
14 years 8 months ago
Extracting and Verifying Cryptographic Models from C Protocol Code by Symbolic Execution
Consider the problem of verifying security properties of a cryptographic protocol coded in C. We propose an automatic solution that needs neither a pre-existing protocol descripti...
Mihhail Aizatulin, Andrew D. Gordon, Jan Jürj...
103
Voted
CHI
2002
ACM
16 years 4 months ago
Observed behavior and perceived value of authors in usenet newsgroups: bridging the gap
In this paper we describe an evaluation of behavioral descriptors generated from an analysis of a large collection of Usenet newsgroup messages. The metrics describe aspects of ne...
Andrew T. Fiore, Scott Lee Tiernan, Marc A. Smith
EDBT
2004
ACM
187views Database» more  EDBT 2004»
16 years 4 months ago
Hierarchical In-Network Data Aggregation with Quality Guarantees
Earlier work has demonstrated the effectiveness of in-network data aggregation in order to minimize the amount of messages exchanged during continuous queries in large sensor netwo...
Antonios Deligiannakis, Yannis Kotidis, Nick Rouss...