Sciweavers

108 search results - page 10 / 22
» Verifying Design with Proof Scores
Sort
View
EUROCRYPT
2000
Springer
14 years 5 days ago
Fair Encryption of RSA Keys
Cryptography is more and more concerned with elaborate protocols involving many participants. In some cases, it is crucial to be sure that players behave fairly especially when the...
Guillaume Poupard, Jacques Stern
CORR
2007
Springer
122views Education» more  CORR 2007»
13 years 8 months ago
Impact of Thermal Behavior on Offset in a High-Q Gyroscope
In this paper, the CFD approach is used to simulate the thermal behavior in a sensitive high-Q gyroscope. The electromagnetically driving wires, in which the alternating current f...
Fei Duan, Jiwei Jiao, Yucai Wang
STTT
2010
122views more  STTT 2010»
13 years 7 months ago
Rodin: an open toolset for modelling and reasoning in Event-B
Event-B is a formal method for system-level modelling and analysis. Key features of Event-B are the use of set theory as a modelling notation, the use of ent to represent systems a...
Jean-Raymond Abrial, Michael J. Butler, Stefan Hal...
CHI
2007
ACM
14 years 9 months ago
Approaches to web search and navigation for older computer novices
: A proof of concept web search and navigation system was developed for older people for whom the Internet is seen as an alien territory. A joint industry/academia team deployed Us...
Anna Dickinson, Michael J. Smith, John L. Arnott, ...
CSFW
2006
IEEE
14 years 2 months ago
Cryptographically Sound Theorem Proving
We describe a faithful embedding of the Dolev-Yao model of Backes, Pfitzmann, and Waidner (CCS 2003) in the theorem prover Isabelle/HOL. This model is cryptographically sound in ...
Christoph Sprenger, Michael Backes, David A. Basin...