<--- Back to Details
First PageDocument Content
Software verification / Rabbit Model Checker / Ambient intelligence / Software engineering / Year of birth missing / CHIC / Lecture Notes in Computer Science / International Conference on Formal Techniques for Networked and Distributed Systems
Date: 2015-02-11 15:38:37
Software verification
Rabbit Model Checker
Ambient intelligence
Software engineering
Year of birth missing
CHIC
Lecture Notes in Computer Science
International Conference on Formal Techniques for Networked and Distributed Systems

Dirk Beyer Curriculum Vitae[removed]Coordinates p Affiliation:

Add to Reading List

Source URL: www.sosy-lab.org

Download Document from Source Website

File Size: 124,86 KB

Share Document on Facebook

Similar Documents

Cryptography / Digital signature / Random oracle / IP / Ibi / Schnorr signature

A preliminary version of this paper appears in Advances in Cryptology – EUROCRYPT 2004, volume 3027 of Lecture Notes in Computer Science, C. Cachin and J. Camenisch ed., Springer-Verlag, 2004. This is the full version.

DocID: 1xVS4 - View Document

Cryptography / Public-key cryptography / Identity-based cryptography / ID-based encryption / Advantage / Paillier cryptosystem / BonehFranklin scheme

An extended abstract of this paper appears in Victor Shoup, editor, Advances in Cryptology – CRYPTO 2005, Volume 3621 of Lecture Notes in Computer Science, pages 205–222, Santa Barbara, California, August 14 – 18,

DocID: 1xVAE - View Document

Cryptography / Cryptographic hash functions / HMAC / Message authentication code / Hash function / Collision attack / MD5 / Collision resistance / SHA-1 / Crypt / One-way compression function / Security of cryptographic hash functions

An abridged version of this paper appears in Advances in Cryptology – Crypto 96 Proceedings, Lecture Notes in Computer Science Vol. 1109, N. Koblitz ed., Springer-Verlag, 1996. Keying Hash Functions for Message Authent

DocID: 1xTNj - View Document

Cryptography / Hashing / Pseudorandomness / HMAC / Pseudorandom function family / Cryptographic hash function / Hash function / Oracle machine / Block cipher

A preliminary version of this paper appears in Advances in Cryptology – CRYPTO ’06, Lecture Notes in Computer Science Vol. 4117 , C. Dwork ed., Springer-Verlag, 2006. This is the full version. New Proofs for NMAC and

DocID: 1xTyQ - View Document

Consent to Publish 123 Lecture Notes in Computer Science

DocID: 1vnVU - View Document