Sciweavers

2303 search results - page 14 / 461
» The Cryptographic Abstract Machine
Sort
View
97
Voted
SEQLEARN
2001
Springer
221views Algorithms» more  SEQLEARN 2001»
15 years 6 months ago
On the Need for a Neural Abstract Machine
eed for a Neural Abstract Machine Diego Sona, Alessandro Sperduti Dipartimento di Informatica Universit`a di Pisa
Diego Sona, Alessandro Sperduti
COORDINATION
2005
Springer
15 years 8 months ago
A Correct Abstract Machine for Safe Ambients
t Abstract Machine for Safe Ambients Daniel Hirschkoff1 , Damien Pous1 , and Davide Sangiorgi2 1 ENS Lyon, France 2 Universit`a di Bologna, Italy Abstract. We describe an abstract...
Daniel Hirschkoff, Damien Pous, Davide Sangiorgi
TACAS
2007
Springer
67views Algorithms» more  TACAS 2007»
15 years 8 months ago
Searching for Shapes in Cryptographic Protocols
Abstract. We describe a method for enumerating all essentially different executions possible for a cryptographic protocol. We call them the shapes of the protocol. Naturally occur...
Shaddin F. Doghmi, Joshua D. Guttman, F. Javier Th...
TGC
2005
Springer
15 years 7 months ago
Programming Cryptographic Protocols
Cryptographic protocols are useful for trust engineering in distributed transactions. Transactions require specific degrees of confidentiality and agreement between the principal...
Joshua D. Guttman, Jonathan C. Herzog, John D. Ram...
DLT
2006
15 years 3 months ago
Can Abstract State Machines Be Useful in Language Theory?
ract State Machines Be Useful in Language Theory? Yuri Gurevich a Margus Veanes a Charles Wallace b aMicrosoft Research, Redmond, Washington, USA bMichigan Tech, Houghton, Michigan...
Yuri Gurevich, Charles Wallace