This paper contrasts two existing type-based techniques for the analysis of authentication protocols. The former, proposed by Gordon and Jeffrey, uses dependent types for nonces a...
In the design of resource bounded agents, high-level cognitive activities, such as reasoning, raise important problems related both to the adaptive ability and to the computationa...
This publication summarizes research on the the design and implementation of liberalized version of existing truth-finding protocols for argumentation, such as the standard two-a...
Abstract. Transformations of signed documents raise questions of technical and organisational nature which render the legal security of the transformed document doubtful. In partic...
It is advocated to use the ISO/IEC 15504 standard into new domains not related to Information Technology (IT), giving a powerful enterprise-wide assessment tool for quality manager...