Parity of a permutation

Results: 103



#Item
11Automated analysis of security protocols with global state Steve Kremer INRIA Nancy - Grand’Est & Loria, France Abstract—Security APIs, key servers and protocols that need to keep the status of transactions, require

Automated analysis of security protocols with global state Steve Kremer INRIA Nancy - Grand’Est & Loria, France Abstract—Security APIs, key servers and protocols that need to keep the status of transactions, require

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2014-04-21 13:48:10
12Geocontinua I Lecture Notes Lorenzo Colli February 26, 2014  ii

Geocontinua I Lecture Notes Lorenzo Colli February 26, 2014 ii

Add to Reading List

Source URL: www.geophysik.uni-muenchen.de

Language: English - Date: 2014-02-26 04:04:02
13An Implementation of Bigraph Matching Arne John Glenstrup ∗ , Troels Christoffer Damgaard, Lars Birkedal, Espen Højsgaard IT University of Copenhagen, Denmark Abstract We describe a provably sound and complete matchin

An Implementation of Bigraph Matching Arne John Glenstrup ∗ , Troels Christoffer Damgaard, Lars Birkedal, Espen Højsgaard IT University of Copenhagen, Denmark Abstract We describe a provably sound and complete matchin

Add to Reading List

Source URL: www.itu.dk

Language: English - Date: 2007-11-05 12:26:38
14A subexponential lower bound for the Random Facet algorithm for Parity Games Oliver Friedmann∗ Thomas Dueholm Hansen†

A subexponential lower bound for the Random Facet algorithm for Parity Games Oliver Friedmann∗ Thomas Dueholm Hansen†

Add to Reading List

Source URL: files.oliverfriedmann.de

Language: English - Date: 2012-02-10 07:43:15
15Formally Certifying the Security of Digital Signature Schemes Santiago Zanella B´eguelin Benjamin Gr´egoire INRIA Sophia Antipolis - M´editerran´ee Microsoft Research - INRIA Joint Centre {Santiago.Zanella,Benjamin.G

Formally Certifying the Security of Digital Signature Schemes Santiago Zanella B´eguelin Benjamin Gr´egoire INRIA Sophia Antipolis - M´editerran´ee Microsoft Research - INRIA Joint Centre {Santiago.Zanella,Benjamin.G

Add to Reading List

Source URL: certicrypt.gforge.inria.fr

Language: English
16Addressing Covert Termination and Timing Channels in Concurrent Information Flow Systems Deian Stefan1 Alejandro Russo2

Addressing Covert Termination and Timing Channels in Concurrent Information Flow Systems Deian Stefan1 Alejandro Russo2

Add to Reading List

Source URL: www.amitlevy.com

Language: English - Date: 2012-10-19 15:09:55
17PEREA: Towards Practical TTP-Free Revocation in Anonymous Authentication Patrick P. Tsang† , Man Ho Au‡ , Apu Kapadia† , Sean W. Smith† †  Department of Computer Science

PEREA: Towards Practical TTP-Free Revocation in Anonymous Authentication Patrick P. Tsang† , Man Ho Au‡ , Apu Kapadia† , Sean W. Smith† † Department of Computer Science

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2009-03-26 16:30:23
18CCCG 2011, Toronto ON, August 10–12, 2011  A Fourier-Theoretic Approach for Inferring Symmetries Xiaoye Jiang∗  Jian Sun†

CCCG 2011, Toronto ON, August 10–12, 2011 A Fourier-Theoretic Approach for Inferring Symmetries Xiaoye Jiang∗ Jian Sun†

Add to Reading List

Source URL: 2011.cccg.ca

Language: English - Date: 2011-08-06 04:11:12
19CCCG 2011, Toronto ON, August 10–12, 2011  A Fourier-Theoretic Approach for Inferring Symmetries Xiaoye Jiang∗  Jian Sun†

CCCG 2011, Toronto ON, August 10–12, 2011 A Fourier-Theoretic Approach for Inferring Symmetries Xiaoye Jiang∗ Jian Sun†

Add to Reading List

Source URL: www.cccg.ca

Language: English - Date: 2011-08-06 04:11:12
20Refinement trees: Calculi, Tools and Applications Mihai Codescu and Till Mossakowski DFKI GmbH Bremen, CALCO 2011

Refinement trees: Calculi, Tools and Applications Mihai Codescu and Till Mossakowski DFKI GmbH Bremen, CALCO 2011

Add to Reading List

Source URL: calco2011.ecs.soton.ac.uk

Language: English - Date: 2011-09-15 16:40:19