Sciweavers

153 search results - page 19 / 31
» Properties of Signature Change Patterns
Sort
View
ESORICS
2005
Springer
14 years 2 months ago
Limits of the Cryptographic Realization of Dolev-Yao-Style XOR
The abstraction of cryptographic operations by term algebras, called Dolev-Yao models, is essential in almost all tool-supported methods for proving security protocols. Recently si...
Michael Backes, Birgit Pfitzmann
EUROCRYPT
2010
Springer
14 years 1 months ago
Adaptively Secure Broadcast
A broadcast protocol allows a sender to distribute a message through a point-to-point network to a set of parties, such that (i) all parties receive the same message, even if the s...
Martin Hirt, Vassilis Zikas
ZUM
2000
Springer
107views Formal Methods» more  ZUM 2000»
14 years 5 days ago
How to Drive a B Machine
The B-Method is a state-based formal method that describes behaviour in terms of MACHINES whose states change under OPERATIONS. The process algebra CSP is an event-based formalism ...
Helen Treharne, Steve Schneider
CSDA
2010
111views more  CSDA 2010»
13 years 8 months ago
Robust online signal extraction from multivariate time series
We introduce robust regression-based online filters for multivariate time series and discuss their performance in real time signal extraction settings. We focus on methods that ca...
Vivian Lanius, Ursula Gather
GPEM
2007
95views more  GPEM 2007»
13 years 8 months ago
Where is evolutionary computation going? A temporal analysis of the EC community
Studying an evolving complex system and drawing some conclusions from it is an integral part of nature-inspired computing; being a part of that complex system, some insight can als...
Carlos Cotta, Juan Julián Merelo Guerv&oacu...