Sciweavers

3229 search results - page 55 / 646
» Theories with the Independence Property
Sort
View
CORR
2010
Springer
151views Education» more  CORR 2010»
13 years 8 months ago
How to prevent type-flaw attacks on security protocols under algebraic properties
In this paper, we prove that type-tagging prevents type-flaw attacks on security protocols that use the Exclusive-OR operator as our main contribution. Our proof method is general ...
Sreekanth Malladi, Pascal Lafourcade
MFCS
2007
Springer
14 years 2 months ago
Properties Complementary to Program Self-reference
In computability theory, program self-reference is formalized by the not-necessarily-constructive form of Kleene’s Recursion Theorem (krt). In a programming system in which krt h...
John Case, Samuel E. Moelius
ICIP
2006
IEEE
14 years 10 months ago
Multichannel Sampling of Parametric Signals with a Successive Approximation Property
Recently the sampling theory for certain parametric signals based on rate of innovation has been extended to all sampling kernels that satisfy the Strang-Fix conditions, thus incl...
Julius Kusuma, Vivek K. Goyal
CPHYSICS
2007
103views more  CPHYSICS 2007»
13 years 8 months ago
Algorithms for the evolution of electronic properties in nanocrystals
We illustrate recent progress in developing algorithms for solving the Kohn-Sham problem. Key ingredients of our algorithm include pseudopotentials implemented on a real space gri...
James R. Chelikowsky, Murilo L. Tiago, Yousef Saad...
IEEEARES
2009
IEEE
14 years 3 months ago
Algebraic Properties in Alice and Bob Notation
—Alice and Bob notation is a popular way to describe security protocols: it is intuitive, succinct, and yet expressive. Several formal protocol specification languages are based...
Sebastian Mödersheim