Sciweavers

1190 search results - page 68 / 238
» You are There
Sort
View
HICSS
1998
IEEE
89views Biometrics» more  HICSS 1998»
14 years 11 days ago
Are You "Pulling the Plug" or "Pushing Up the Daisies"?
F. Ljungberg, Carsten Sørensen
CAV
1998
Springer
103views Hardware» more  CAV 1998»
14 years 10 days ago
You Assume, We Guarantee: Methodology and Case Studies
Assume-guarantee reasoning has long been advertised as an important method for decomposing proof obligations in system veri cation. Re nement mappings (homomorphisms) have long bee...
Thomas A. Henzinger, Shaz Qadeer, Sriram K. Rajama...
CRYPTO
1998
Springer
109views Cryptology» more  CRYPTO 1998»
14 years 10 days ago
Self-Delegation with Controlled Propagation - or - What If You Lose Your Laptop
We introduce delegation schemes wherein a user may delegate certain rights to himself, but may not safely delegate these rights to others. In our motivating application, a user ha...
Oded Goldreich, Birgit Pfitzmann, Ronald L. Rivest