Science Advances

Results: 920



#Item
1Cryptography / Digital signature / Random oracle / IP / Ibi / Schnorr signature

A preliminary version of this paper appears in Advances in Cryptology – EUROCRYPT 2004, volume 3027 of Lecture Notes in Computer Science, C. Cachin and J. Camenisch ed., Springer-Verlag, 2004. This is the full version.

Add to Reading List

Source URL: www.neven.org

Language: English - Date: 2012-04-18 06:07:38
2Cryptography / Public-key cryptography / Identity-based cryptography / ID-based encryption / Advantage / Paillier cryptosystem / BonehFranklin scheme

An extended abstract of this paper appears in Victor Shoup, editor, Advances in Cryptology – CRYPTO 2005, Volume 3621 of Lecture Notes in Computer Science, pages 205–222, Santa Barbara, California, August 14 – 18,

Add to Reading List

Source URL: www.neven.org

Language: English - Date: 2012-04-18 06:07:55
3Statistical randomness / Temporal logic / Theoretical computer science / Probability / Markov models / Model checkers / Markov processes / Model checking / PRISM model checker / Markov decision process / Linear temporal logic / Computation tree logic

Advances and Challenges of Probabilistic Model Checking Marta Kwiatkowska Gethin Norman David Parker Computing Laboratory Department of Computing Science

Add to Reading List

Source URL: qav.comlab.ox.ac.uk

Language: English - Date: 2011-12-22 18:19:34
4Model checkers / Software engineering / Formal methods / Theoretical computer science / Software quality / Computing / PRISM model checker / Model checking / Formal verification / Markov chain / Stochastic / Reliability engineering

Advances and Challenges of Quantitative Verification and Synthesis for Cyber-Physical Systems Marta Kwiatkowska Department of Computer Science, University of Oxford, UK Abstract—We are witnessing a huge growth of cyber

Add to Reading List

Source URL: qav.comlab.ox.ac.uk

Language: English - Date: 2016-09-02 06:46:32
5Cryptography / Cryptographic hash functions / HMAC / Message authentication code / Hash function / Collision attack / MD5 / Collision resistance / SHA-1 / Crypt / One-way compression function / Security of cryptographic hash functions

An abridged version of this paper appears in Advances in Cryptology – Crypto 96 Proceedings, Lecture Notes in Computer Science Vol. 1109, N. Koblitz ed., Springer-Verlag, 1996. Keying Hash Functions for Message Authent

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2006-02-10 14:35:40
6Cryptography / Hashing / Pseudorandomness / HMAC / Pseudorandom function family / Cryptographic hash function / Hash function / Oracle machine / Block cipher

A preliminary version of this paper appears in Advances in Cryptology – CRYPTO ’06, Lecture Notes in Computer Science Vol. 4117 , C. Dwork ed., Springer-Verlag, 2006. This is the full version. New Proofs for NMAC and

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2006-08-14 17:10:52
7Temporal logic / Artificial intelligence / Human behavior / Cognitive science / Logic / Linear temporal logic / Computation tree logic / Autonomous agent / Probabilistic logic / Trust / Humanrobot interaction / Practical reason

Cognitive Reasoning and Trust in Human-Robot Interactions? Marta Kwiatkowska Department of Computer Science, University of Oxford, Oxford, UK Abstract. We are witnessing accelerating technological advances in autonomous

Add to Reading List

Source URL: qav.comlab.ox.ac.uk

Language: English - Date: 2017-04-04 10:42:31
8

PDF Document

Add to Reading List

Source URL: www.advances-in-radio-science.net

- Date: 2016-01-08 05:27:27
    9

    PDF Document

    Add to Reading List

    Source URL: www.advances-in-science-and-research.net

    - Date: 2018-04-25 05:31:42
      10

      PDF Document

      Add to Reading List

      Source URL: www.advances-in-science-and-research.net

      - Date: 2016-01-08 04:06:54
        UPDATE