Sciweavers

2303 search results - page 14 / 461
» The Cryptographic Abstract Machine
Sort
View
SEQLEARN
2001
Springer
221views Algorithms» more  SEQLEARN 2001»
13 years 12 months ago
On the Need for a Neural Abstract Machine
eed for a Neural Abstract Machine Diego Sona, Alessandro Sperduti Dipartimento di Informatica Universit`a di Pisa
Diego Sona, Alessandro Sperduti
COORDINATION
2005
Springer
14 years 28 days ago
A Correct Abstract Machine for Safe Ambients
t Abstract Machine for Safe Ambients Daniel Hirschkoff1 , Damien Pous1 , and Davide Sangiorgi2 1 ENS Lyon, France 2 Universit`a di Bologna, Italy Abstract. We describe an abstract...
Daniel Hirschkoff, Damien Pous, Davide Sangiorgi
TACAS
2007
Springer
67views Algorithms» more  TACAS 2007»
14 years 1 months ago
Searching for Shapes in Cryptographic Protocols
Abstract. We describe a method for enumerating all essentially different executions possible for a cryptographic protocol. We call them the shapes of the protocol. Naturally occur...
Shaddin F. Doghmi, Joshua D. Guttman, F. Javier Th...
TGC
2005
Springer
14 years 26 days ago
Programming Cryptographic Protocols
Cryptographic protocols are useful for trust engineering in distributed transactions. Transactions require specific degrees of confidentiality and agreement between the principal...
Joshua D. Guttman, Jonathan C. Herzog, John D. Ram...
DLT
2006
13 years 8 months ago
Can Abstract State Machines Be Useful in Language Theory?
ract State Machines Be Useful in Language Theory? Yuri Gurevich a Margus Veanes a Charles Wallace b aMicrosoft Research, Redmond, Washington, USA bMichigan Tech, Houghton, Michigan...
Yuri Gurevich, Charles Wallace