Sciweavers

239 search results - page 34 / 48
» Proof Techniques for Cryptographic Processes
Sort
View
ACNS
2007
Springer
112views Cryptology» more  ACNS 2007»
14 years 2 months ago
Generic Transformation to Strongly Unforgeable Signatures
Recently, there are several generic transformation techniques proposed for converting unforgeable signature schemes (the message in the forgery has not been signed yet) into strong...
Qiong Huang, Duncan S. Wong, Yiming Zhao
SRDS
1999
IEEE
14 years 27 days ago
Formal Hazard Analysis of Hybrid Systems in cTLA
Hybrid systems like computer-controlled chemical plants are typical safety critical distributed systems. In present practice, the safety of hybrid systems is guaranteed by hazard ...
Peter Herrmann, Heiko Krumm
ICIP
2002
IEEE
14 years 10 months ago
On steganalysis of random LSB embedding in continuous-tone images
Abstract? In this paper we present an LSB steganalysis technique that can detect the existence of hidden messages that are randomly embedded in the least significant bits of natura...
Sorina Dumitrescu, Xiaolin Wu, Nasir D. Memon
ESOP
2004
Springer
14 years 2 months ago
Resources, Concurrency, and Local Reasoning (Abstract)
t) Peter W. O’Hearn Queen Mary, University of London In the 1960s Dijkstra suggested that, in order to limit the complexity of potential process interactions, concurrent programs...
Peter W. O'Hearn
CSFW
2005
IEEE
14 years 2 months ago
Temporal Rank Functions for Forward Secrecy
A number of key establishment protocols claim the property of forward secrecy, where the compromise of a longterm key does not result in the compromise of previously computed sess...
Rob Delicata, Steve A. Schneider