Sciweavers

139 search results - page 7 / 28
» Modeling the invisible college
Sort
View
FUIN
2000
85views more  FUIN 2000»
13 years 9 months ago
Stubborn Sets for Model Checking the EF/AG Fragment of CTL
The general stubborn set approach to CTL model checking 2] has the drawback that one either nds a stubborn set with only one enabled transition or one has to expand all enabled tra...
Karsten Schmidt 0004
ATAL
2009
Springer
14 years 4 months ago
Abstraction in model checking multi-agent systems
ion in model checking multi-agent systems Mika Cohen Department of Computing Imperial College London London, UK Mads Dam Access Linnaeus Center Royal Institute of Technology Stockh...
Mika Cohen, Mads Dam, Alessio Lomuscio, Francesco ...
CTRSA
2004
Springer
120views Cryptology» more  CTRSA 2004»
14 years 3 months ago
Identity Based Undeniable Signatures
Abstract. In this paper, we give a first example of identity based undeniable signature using pairings over elliptic curves. We extend to the identity based setting the security m...
Benoît Libert, Jean-Jacques Quisquater
CANDC
2005
ACM
13 years 11 months ago
Exhibition: computational schemes for biomimetic sculpture
The Mid-Ocean Studio, Brown University’s SHAPE lab, and Goldsmiths College are collaborating on a prototype system for the automatic evolution of biomimetic sculpture using stru...
Brower Hatcher, Karl Aspelund, Andrew R. Willis, J...
EUROCRYPT
1994
Springer
14 years 1 months ago
Designated Confirmer Signatures
Abstract. We construct the first O(1)-size designated confirmer signatures (DCS) with security in the state-of-the-art model of Camenisch and Michels, Eurocrypt 2000, without rando...
David Chaum