Sciweavers

32032 search results - page 140 / 6407
» Verified programming in Guru
Sort
View
108
Voted
FUIN
2006
68views more  FUIN 2006»
15 years 4 months ago
Expressing and Verifying Temporal and Structural Properties of Mobile Agents
Logics for expressing properties of Petri hypernets, a visual formalism for modelling mobile agents, are proposed. Two classes of properties are of interest--the temporal evolution...
Marek A. Bednarczyk, Wojciech Jamroga, Wieslaw Paw...
CORR
2007
Springer
96views Education» more  CORR 2007»
15 years 4 months ago
Edit and verify
Abstract. Automated theorem provers are used in extended static checking, where they are the performance bottleneck. Extended static checkers are run typically after incremental ch...
Radu Grigore, Michal Moskal
143
Voted
CORR
2002
Springer
122views Education» more  CORR 2002»
15 years 4 months ago
On alternative approach for verifiable secret sharing
The proposed approach works for any underlying secret sharing scheme. It is based on the concept of verification sets of participants, related to authorized set of participants. T...
Kamil Kulesza, Zbigniew Kotulski, Josef Pieprzyk
IADIS
2004
15 years 6 months ago
Preliminary Steps in Designing and Implementing a Privilege Verifier for PMI
We have designed and deployed a system that uses X.509 public-key certificates (PKC) and attribute certificates (AC) for access control. This includes an authorization service for...
Diana Berbecaru, Antonio Lioy
182
Voted
IEEEIAS
2009
IEEE
15 years 2 months ago
On Security Notions for Verifiably Encrypted Signature
First we revisit three - BGLS, MBGLS and GZZ verifiably encrypted signature schemes [2, 3, 6]. We find that they are all not strong unforgeable.We remark that the notion of existen...
Xu An Wang, Xiaoyuan Yang, Qingquan Peng